Reinap, Aivar, 1968-
Kui aastaid tagasi müüs Hansapank talle kuulunud Eesti suurima kindlustusseltsi Eesti Kindlustus konkurentidele Sampo grupist, siis praegu pank tunnistab oma kunagist viga ja on otsustanud naasta varakindlustusturule
Ilmunud ka: Finansovõi Menedzhment : infovõpusk nr. 11 veebr. lk. 8. Metasite Business Solutions'i koostatud Balti e-panganduse aruande järgi on Eesti e-panganduse kolm juhtivat panka SEB, Sampo ja Hansapank. Tabel: 2006. aasta e-panganduse edetabel
Boo Yong Ahn
Full Text Available We model the error control of the partial buffer sharing of ATM by a queueing system M1,M2/G/1/K+1 with threshold and instantaneous Bernoulli feedback. We first derive the system equations and develop a recursive method to compute the loss probabilities at an arbitrary time epoch. We then build an approximation scheme to compute the mean waiting time of each class of cells. An algorithm is developed for finding the optimal threshold and queue capacity for a given quality of service.
Viiendat korda korraldatava konkursi Ettevõtluse Auhind peavõitjaks tunnistati Regio ning konkurentsivõimelisimaks ettevõtteks Hansapank. Võitjaid autasustas president Arnold Rüütel. Kaubandus-Tööstuskoja juhatuse esimehe Siim Raie kommentaarid
Hansapank uurib võimalust tõsta eluasemelaenud eraldi tütarpanka, mis tegeleks rahvusvaheliselt võlakirjaturgudelt raha hankimisega ning kodulaenude väljastamisega. Lisa: Rootsi kodulaenupank Swedbank Mortgage
Lars HolmbergFaculty of Law, University of Copenhagen, Copenhagen, DenmarkAbstract: Wine fraud may take several forms, of which two are discussed here: consumption fraud aimed at the wine market in general, and collector fraud aimed at the very top of the wine market. Examples of wine fraud past and present are given, and a suggestion about the extent of contemporary consumer fraud in Europe is provided. Technological possibilities for future detection and prevention of both forms of wine fra...
Full Text Available Lars HolmbergFaculty of Law, University of Copenhagen, Copenhagen, DenmarkAbstract: Wine fraud may take several forms, of which two are discussed here: consumption fraud aimed at the wine market in general, and collector fraud aimed at the very top of the wine market. Examples of wine fraud past and present are given, and a suggestion about the extent of contemporary consumer fraud in Europe is provided. Technological possibilities for future detection and prevention of both forms of wine fraud are discussed.Keywords: adulteration, counterfeit, detection
Health fraud involves selling drugs, devices, foods, or cosmetics that have not been proven effective. Keep in ... you from getting the treatment you really need. Health fraud scams can be found everywhere, promising help ...
Graafland, J.J.; Liedekerke, L.; Dubbink, W.; van Liedekerke, L.; van Luijk, H.
Due to the actions of a whistleblower The Netherlands was confronted with a massive case of construction fraud involving almost the entire construction sector. Price fixing, prior consulting, duplicate accounts, fictitious invoices and active corruption of civil servants were rampant practices. This
Jiang, Fan; Käkölä, Timo
Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...
Kaur, Paramjit; Krishan, Kewal; Sharma, Suresh K; Kanchan, Tanuj
With the advent of modern technology, the way society handles and performs monetary transactions has changed tremendously. The world is moving swiftly towards the digital arena. The use of Automated Teller Machine (ATM) cards (credit and debit) has led to a "cash-less society" and has fostered digital payments and purchases. In addition to this, the trust and reliance of the society upon these small pieces of plastic, having numbers engraved upon them, has increased immensely over the last two decades. In the past few years, the number of ATM fraud cases has increased exponentially. With the money of the people shifting towards the digital platform, ATM skimming has become a problem that has eventually led to a global outcry. The present review discusses the serious repercussions of ATM card cloning and the associated privacy, ethical and legal concerns. The preventive measures which need to be taken and adopted by the government authorities to mitigate the problem have also been discussed.
Clarke, R.A.; Fang, Z.M.; Kearsley, J.H.; Lee, C.S.; Sarris, M.; De Murrell, D.
Full text: ATM, the tumour suppressor protein mutated in ataxia-telangiectasia, is of pivotal importance in controlling the cells primary response to ionising radiation (IR) induced DNA damage. Mutations in ATM which reduce the level of the ATM protein and/or compromise ATM functions are known to give rise to radiosensitivity and defective cell cycle checkpoint control. In response to DNA damage ATM kinase is rapidly activated and initiates downstream signalling to cell cycle control molecules including p53. To investigate additional mechanisms of ATM control we have employed ATM antisense expression in cultured cells, western analyses and immunohistochemistry in situ. We report that ATM can be up-regulated up to 10-fold following exposure to low levels of ionising radiation. ATM radiation-induction was radiation dose dependent while the rapidity of the response indicates a post translational pathway. The concurrent time frames for the radiation-induction of ATM levels and the activation of ATM kinase activity appear to be complimentary in boosting ATM's protective response to IR induced DNA damage, especially in ATM 'low expressing' systems. We also provide the first report of ATM misregulation in 2 cancer patients, indicating that ATM is not only radio-protective but has possible implications in cancer, particularly breast cancer. These results have particular importance in defining the regulation of the ATM protein as an: adaptive radio-response; radio-prognostic market in tumours and normal tissue, and breast cancer marker
Full Text Available This article aims to introduce to readers the topic of fraud management – detection of fraudulent behaviour. The article is divided into two parts. The first part presents what is meant by fraud and fraudulent behaviour. In the second part a case study dealing with fraudulent behaviour detection in the procurement area is introduced.
Burton, Grace M.; Burton, John R.
High school students are warned against service station fraud. A problem-solving section is designed to help students calculate consumer costs for various fraudulent transactions. Several ways of reducing fraud or of lessening the chances of problems are noted. (MP)
Bentall, M; Turton, B
Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o
Cheung, Nim K.
Networks based on Asynchronous Transfer Mode (ATM) are expected to provide cost-effective and ubiquitous infrastructure to support broadband and multimedia services. In this paper, we give an overview of the ATM standards and its associated physical layer transport technologies. We use the experimental HIPPI-ATM-SONET (HAS) interface in the Nectar Gigabit Testbed to illustrate how one can use the SONET/ATM public network to provide transport for bursty gigabit applications.
Ionela – Corina Chersan
Full Text Available Fraud can range from minor employee theft and unproductive behavior tomisappropriation of assets and fraudulent financial reporting. The risk of fraud can be reduced through a combination of prevention and detection measures. Moreover, prevention and deterrence measures are much less costly than the time and expense required for fraud detection and investigation. The information presented in this document generally is applicable to entities of all sizes. However, the degree to which certain programs and controls are applied in smaller, less-complex entities and the formality of theirapplication are likely to differ from larger organizations.
First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.
Department of Veterans Affairs — Retrieves and updates data to indicate any award lines that have been reduced or terminated. The data is captured by the Fraud Decision screen (as part of the Awards...
Nagrecha, Saurabh; Johnson, Reid A; Chawla, Nitesh V
Nonstandard insurers suffer from a peculiar variant of fraud wherein an overwhelming majority of claims have the semblance of fraud. We show that state-of-the-art fraud detection performs poorly when deployed at underwriting. Our proposed framework "FraudBuster" represents a new paradigm in predicting segments of fraud at underwriting in an interpretable and regulation compliant manner. We show that the most actionable and generalizable profile of fraud is represented by market segments with high confidence of fraud and high loss ratio. We show how these segments can be reported in terms of their constituent policy traits, expected loss ratios, support, and confidence of fraud. Overall, our predictive models successfully identify fraud with an area under the precision-recall curve of 0.63 and an f-1 score of 0.769.
In 2011, a working group on improved fraud prevention and management was established. The group was composed of the Director of Administration and General Infrastructure, the Head of the Human Resources Department, and the Heads of the Legal Service and Internal Audit. It recommended the adoption of a global fraud prevention and management policy. The global fraud prevention and management policy was implemented through the CERN Anti-Fraud Policy, which was endorsed by the Enlarged Directorate in May 2012 and approved by the Director-General for entry into force on 1 January 2013. The CERN Anti-Fraud Policy defines the Organization’s policy in matters of fraud. CERN has a zero tolerance approach towards fraud, as it would compromise the accomplishment of its objectives and undermine its functioning, credibility and reputation. The policy also states CERN’s commitment to the prevention, identification and investigation of fraud. All CERN contributors have a key rol...
Musau, Steve; Vian, Taryn
Hospitals are vulnerable to corruption. In the U.S., health care fraud has been stimated to cost $60 billion per year, or 3% of total health care expenditures - much of it in the hospital sector. Hospitals account for 50% or more of health care pending in many countries. Fraud and corruption in hospitals negatively affect access and quality, as public servants make off with resources which could have been used to reduce out-of-pocket expenditures for patients, or improve needed services. This...
frauds ENom 47.56% GMO Internet 17.48% Above 5.14% Go Daddy 4.11% Tucows 3.34% Key Systems 2.83% New Dream Network 1.54% Abdomainations 1.29% All...note that ENom is apparently much more victim of abuse than other top domain name registrars. Likewise, Above and GMO Internet rank highly with
Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.
Valentin – Stelian Bădescu
Full Text Available Electronic commerce is experiencing a great extent, and about the same extent fraud seeks - and sometimes is the place to impressive levels. Moreover, computer fraud and, the actors' they do not seem to suffer from the global economic recession and get as sophisticated as a legitimate business model and one of the most important dimensions of the work of modern organizations is the manipulation of information (collection, processing, storage, distribution, etc.. This component informational increasingly involves broader and more complex, with the technological advancement of computer science and globalization of human society, special measures to ensure the security of information. Cyber-crime is an illegal act committed by using a computer network (especially Internet. Cyber-crime is a subset of cybercrime.
Fraudulent misstatement or omission is deliberate amount or disclosures in financial statement. Perpetrators of fraud from people within the company can be from outside the company. Triggers fraud was caused by greed, needs, pressures, opportunities and rational.Financial statements contain material misstatements may result in financial statements are not presented fairly, in all material respects. Misstatement of financial statements may occur as a result of mistake or fraud. In order compan...
The system of emission trading is a complex composed entity with on the one hand a strong environmental component and on the other hand a financial world that hooked on this instrument. In chapter 2 an introduction is provided to the emission trading system. The subsequent chapters elaborate Types of Fraud (Chapter 3), Powers (Chapter 4), and Instruments (Chapter 5). The report shows that various forms of fraud are occurring in emission trading, such as VAT fraud and identity theft. [nl
Peterson, Bonita K.
Reports that limited fraud education takes place in accounting due to a crowded curriculum and misunderstanding of the extent of fraud. Suggests ways to develop content on the topic and provides a list of teaching materials (textbooks, workbooks, trade books, case materials, videos, and reference materials). (Contains 16 references.) (SK)
National Library of Australia, Canberra.
This manual is designed to provide an introduction and basic guide to the use of IBM's Advanced Text Management System (ATMS), the text processing system to be used for the creation of Australian data bases within AUSINET. Instructions are provided for using the system to enter, store, retrieve, and modify data, which may then be displayed at the…
van der Waaij, B.D.; Sprenkels, Ron; van Beijnum, Bernhard J.F.; Pras, Aiko
This paper discusses the design of a public domain web based ATM PVC Management tool for the Dutch SURFnet research ATM network. The aim of this tool is to assists in the creation and deletion of PVCs through local and remote ATM network domains. The tool includes security mechanisms to restrict the
Ruth, van Saskia M.; Huisman, Wim; Luning, Pieternel A.
Background Food fraud prevention and fraud vulnerability reduction are the first steps to combat food fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of fraud, it requires different tactics than the common food safety approaches. However,
Raluca Georgiana POPA
Full Text Available Starting from the consideration that fighting cybercrime is a continuous process, the more the types of old crimes are committed today through modern means (computer fraud at distances of thousands of kilometers, international cooperation is vital to combat this phenomenon.In EU countries, still under financial crisis "the phrase", cybercrime has found a "positive environment" taking advantage of poor security management systems of these countries.Factors that led criminal groups to switch "their activities" are related to so-called advantages of the "gains" obtained with relatively low risk.In Romania, more than any of the EU member states criminal activities set as target financial institutions or foreign citizens, weakening confidence in financial systems and the security of communication networks in our country, people's confidence in electronic payment instruments and those available on the Internet.
Full Text Available The economic crunch created a specific context for activity and profitability failing. The corruption is more and more common in our days. In the same time, the amount of money lost by businesses and the public sector to larger frauds increased last year to unthinkable limits. The shareholders expect the directors to take care to protect their company’s assets. This is why the financial controller has a very important role in each organization. The techniques to detect corruption or a fraud are developing every year. Thus, the introduction of computerized accounting has created the opportunities to conduct very comprehensive tests at relatively little cost. However, the fraudsters became more and more clever, and the controllers are responsible for the prevention and detection of fraud. The procedures that controllers should adopt with regard to fraud depend on the risk that fraud could occur and remain undetected and also the risk of that fraud impairing the truth and fairness of the statement.
In this week’s Bulletin (see here), you’ll read that fraudulent activities were uncovered last year by our Internal Audit Service. CERN has a very clearly defined policy in such cases: we base our efforts on prevention through education, we have a policy of protecting those reporting fraud from recrimination, and we have a zero-tolerance policy should fraud be uncovered. I don’t intend to enter into the details of what occurred, but I’d like to remind you that fraud is a very grave business, and something we take extremely seriously. What do we mean by fraud at CERN? Operational Circular No. 10 on “Principles and procedures governing the investigation of fraud” defines fraud in terms of any deception intended to benefit the perpetrator, or a third party, that results in a loss to the Organization. This loss can be to funds, property or reputation. Thankfully, fraud at CERN is a rare occurrence, but we should never be complacent. ...
Full Text Available The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that most of the cited types of electronic fraud are perpetrated across the banking industry. Challenges like lack of resources (detection tools and technologies, inadequate cyber-crime laws and lack of knowledge through education and awareness were noted. It is recommended that the issue of cyber security should be addressed involving all the stakeholders so that technological systems are safeguarded from cyber-attacks
Shamma, Mohammed A.
This presentation is an overview on Satellite Communication for the Aeronautical Telecommunication Management (ATM) research. Satellite Communications are being considered by the FAA and NASA as a possible alternative to the present and future ground systems supporting Air Traffic Communications. The international Civil Aviation Organization (ICAO) have in place Standards and Recommended Practices (SARPS) for the Aeronautical Mobile Satellite Services (AMSS) which is mainly derived from the pre-existing Inmarsat service that has been in service since the 1980s. The Working Group A of the Aeronautical Mobile Communication Panel of ICAO has also been investigating SARPS for what is called the Next Generation Satellite Service (NGSS) which conforms less to the Inmarsat based architecture and explores wider options in terms of satellite architectures. Several designs are being proposed by Firms such as Boeing, ESA, NASA that are geared toward full or secondary usage of satellite communications for ATM. Satellite communications for ATM can serve several purposes ranging from primary usage where ground services would play a minimal backup role, to an integrated solution where it will be used to cover services, or areas that are less likely to be supported by the proposed and existing ground infrastructure. Such Integrated roles can include usage of satellite communications for oceanic and remote land areas for example. It also can include relieving the capacity of the ground network by providing broadcast based services of Traffic Information Services messages (TIS-B), or Flight Information Services (FIS-B) which can take a significant portion of the ground system capacity. Additionally, satellite communication can play a backup role to support any needs for ground replacement, or additional needed capacity even after the new digital systems are in place. The additional bandwidth that can be provided via satellite communications can also open the door for many new
The economic crunch created a specific context for activity and profitability failing. The corruption is more and more common in our days. In the same time, the amount of money lost by businesses and the public sector to larger frauds increased last year to unthinkable limits. The shareholders expect the directors to take care to protect their company’s assets. This is why the financial controller has a very important role in each organization. The techniques to detect corruption or a fraud a...
Enari, Masato; Matsushima-Hibiya, Yuko; Miyazaki, Makoto; Otomo, Ryo
Ataxia-telangiectasia mutated (ATM) protein is a member of the phosphatidylinositol 3-phosphate kinase (PI3-K)-related protein kinase (PIKK) family and is implicated in the initiation of signaling pathways following DNA double strand breaks (DSBs) elicited by exposure to ionizing irradiation (IR) or radiomimetic compounds. Loss of function of the ATM gene product results in the human genetic disorder ataxia-telangiectasia (A-T) characterized by neurodegeneration, immunodeficiency, genomic instability, and cancer predisposition. In response to DSBs, ATM is activated and phosphorylates Ser/Thr-Gln (S/T-Q) sequences on numerous proteins participating in DNA-damage responses. Among these proteins, phosphorylation of the tumor suppressor p53 at Ser15 is known as a target for ATM, which leads to the dissociation of MDM2, an E3 ubiquitin ligase, from p53 to prevent MDM2-dependent p53 degradation. Ser46 on p53 is phosphorylated in response to DSBs and contributes to the preferential transactivation of pro-apoptotic genes, such as p53AIP1, Noxa, and PUMA, to prevent tumor formation. Our group have shown that not only ATM preferentially phosphorylates S/T-Q sequences, but also Ser46, which is a noncanonical site with an S-P sequence for ATM. Ser46 on p53 is directly phosphorylated by ATM in a p53 conformation-dependent manner using the ATP analogue-accepting ATM mutant (ATM-AS) system. This protocol summarizes an approach to identify direct numerous targets for ATM kinase and is used to elucidate ATM signaling pathways in the DNA damage responses.
Griffioen, M.; Hel - van Dijk, van der E.C.J.M. (Lisette)
The Member States of the European Union (EU) are missing billions of Euros each year as a result of cross-border VAT fraud. After its introduction, the current VAT system appeared to contain flaws and proved to be vulnerable to fraud. Tackling VAT fraud since then has become serious business within
Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan
Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright Â© 2011 Elsevier Ireland Ltd. All rights reserved.
Kobak, Dmitry; Shpilkin, Sergey; Pshenichnikov, Maxim S.
Protests greeted the results of Russia's federal election in 2011, with accusations of vote-rigging and fraud. With the country heading to the polls again this September, Dmitry Kobak, Sergey Shpilkin and Maxim S. Pshenichnikov shine a light on several anomalies in the election data set.
The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…
Gottfredson, Linda S.
Critiques the College Board's report, "Reaching the Top," asserting that it illustrates collective fraud in the social sciences, which sustains an egalitarian fiction that intelligence is clustered equally across all human populations. Suggests that while the report omits certain popular falsehoods, it also omits crucial truths about…
Materials Characterization Center glasses ATM-2, ATM-3, and ATM-4 are designed to simulate high-level waste glasses that are likely to result from the reprocessing of commercial nuclear reactor fuels. The three Approved Testing Materials (ATMs) are borosilicate glasses based upon the MCC-76-68 glass composition. One radioisotope was added to form each ATM. The radioisotopes added to form ATM-2, ATM-3, and ATM-4 were 241 Am, 237 Np, and 239 Pu, respectively. Each of the ATM lots was produced in a nominal lot size of 450 g from feed stock melted in a nitrogen-atmosphere glove box at 1200/degree/C in a platinum crucible. Each ATM was then cast into bars. Analyzed compositions of these glasses are listed. The nonradioactive elements were analyzed by inductively coupled argon plasma atomic emission spectroscopy (ICP), and the radioisotope analyses were done by alpha energy analysis. Results are discussed. 7 refs., 3 figs., 5 tabs
Hensley, Katrina; Ludden, Fredrick
Approved for public release, distribution unlimited. In today's world of integrating voice, video and data into a single network, Asynchronous Transfer Mode (ATM) networks have become prevalent in the Department of Defense. The Department of Defense's critical data will have to pass through public networks, which causes concern for security. This study presents an efficient solution aimed at authenticating communications over public ATM networks. The authenticating device, Stargate, utiliz...
Hu, T.C.; Wyckoff, P.S.
Sandia's entry into utilizing clusters of networked workstations is called Computational Plant or CPlant for short. The design of CPlant uses Ethernet to boot the individual nodes, Myrinet to communicate within a node cluster, and ATM to connect between remote clusters. This SAND document covers the work done to enable the use of ATM on the CPlant nodes in the Fall of 1997.
Nazarova Karina O.
Full Text Available The main threats to business are: competitors; supervisory and investigative bodies; tax system; crisis developments; currency exchange rates and so on. However, the world experience of recent decades has shown that not only external phenomena but also own employees can be perceived as tangible threats to business. On the part of the staff, there are, for various reasons, provocations, errors, deception or fraud, which could infringe security of enterprise. The article examines the status and dynamics of corporate fraud in Ukraine and in the world, the most common ways of detecting fraud, the methods that are used to counter it, as well as preventive means. The need to counter fraud within the corporate organization has been substantiated, efficiency of the internal and the external audits in detecting and preventing deception and fraud of employees of enterprise has been proven. The existing ways of detecting fraud in Ukraine were analyzed.
Full Text Available Nowadays, globalisation and business internalisation have led to an increased number of frauds in organisations worldwide. The most affected are the multinational corporations because of the geographical distance, different fiscal systems and local factors that consist in tremendous opportunities for employees and/or managers to involve in fraud schemes. Starting from recent studies and prior efforts of international organisations or countries to stop fraud by imposing regulations to be respected for the economic environment, the purpose of the paper is finding the key factors for detecting and preventing fraud in the organisations. In our approach we use several proposals for a conceptual framework developed by two companies of “The big four”, KPMG and Deloitte. The results indicate that for the number of fraud to decrease, any organisation needs to develop and implement a strong anti-fraud plan, by covering all logical steps to be made in this matter.
Once upon a time, or more precisely during February 1988 at the CCITT Seoul plenary, and definitely arriving as a revolution, ATM hit the hard-core B-ISDN circuit-switching gang. Initiated by the Telecoms' camp, but, surprisingly, soon to be pushed by computer minded people, ATM's generic technological history is somewhat richer than single-sided stories. Here are two classical elements of that history: Firstly, together with X.25, ATM suffers from the connection versus datagram dichotomy, well known for more than twenty years. Secondly, and lesser known, ATM's use of cells in support of the 'I' of B-ISDN was questioned from the very beginning by the packet switching camp. Furthermore, in this context, there are two other essential elements to be considered: Firstly, the exponential growth of the Internet and later intranets, using Internet technology, sparked by the success of the Web and the WINTEL alliance, resulted in a corresponding demand for both aggregate and end-system network bandwidth. Secondly, servers, historically restricted to the exclusive club of HIPPI-equipped supercomputers, suddenly become ordinary high-end PCs with 64-bit wide PCI busses -- definitely aiming at the Gigabit. Here, if your aim is for Gigabit ATM with 5000-transactions per second classical supercomputers, a 65K ATM MTU -- as implemented by Cray -- might be okay. Following Clark and others, another part of the story is the adoption and redefinition, by the IETF, of the Telecoms' notion of 'Integrated Services' and QoS mechanisms. The quest for low-delay IP packet forwarding, perhaps possible over ATM cut-throughs, has resulted in the switching versus/or integrated-with-routing movement. However, a blow for ATM may be the recent results concerning fast routing table lookup algorithms. This, by making Gigabit routing possible using ordinary Pentium processors may eventually render the much prophesized ATM switching performance unnecessary. Recently, with the rise of Gigabit Ethernet
DEPT OF AGRICULTURAL ENGINEERING
Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. ... testing the methods with data from real mobile communications networks. Keywords: Call data, fraud ...... Ph. D. thesis. Pur-.
... 45 Public Welfare 2 2010-10-01 2010-10-01 false Fraud. 235.110 Section 235.110 Public Welfare... PROGRAMS § 235.110 Fraud. State plan requirements: A State plan under title I, IV-A, X, XIV, or XVI of the Social Security Act must provide: (a) That the State agency will establish and maintain: (1) Methods and...
Aymard, Francois; Legube, Gaëlle
Ataxia telangiectasia mutated (ATM) has been known for decades as the main kinase mediating the DNA double-strand break response. Our recent findings suggest that its major role at the sites of breaks likely resides in its ability to modify both the local chromatin landscape and the global chromosome organization in order to promote repair accuracy.
The AFOSR funds were used to purchase a 12 port Fore ATM switch, ATM network interface cards, a SUN UltraSPARC workstation, Lucent WavePoint wireless bridge, and Lucent WaveLAN wireless network interface cards...
Meng, Huan; Ferraro, Ralph; Kongoli, Cezar; Wang, Nai-Yu; Dong, Jun; Zavodsky, Bradley; Yan, Banghua
Passive microwave measurements at certain high frequencies are sensitive to the scattering effect of snow particles and can be utilized to retrieve snowfall properties. Some of the microwave sensors with snowfall sensitive channels are Advanced Microwave Sounding Unit (AMSU), Microwave Humidity Sounder (MHS) and Advance Technology Microwave Sounder (ATMS). ATMS is the follow-on sensor to AMSU and MHS. Currently, an AMSU and MHS based land snowfall rate (SFR) product is running operationally at NOAA/NESDIS. Based on the AMSU/MHS SFR, an ATMS SFR algorithm has been developed recently. The algorithm performs retrieval in three steps: snowfall detection, retrieval of cloud properties, and estimation of snow particle terminal velocity and snowfall rate. The snowfall detection component utilizes principal component analysis and a logistic regression model. The model employs a combination of temperature and water vapor sounding channels to detect the scattering signal from falling snow and derive the probability of snowfall (Kongoli et al., 2015). In addition, a set of NWP model based filters is also employed to improve the accuracy of snowfall detection. Cloud properties are retrieved using an inversion method with an iteration algorithm and a two-stream radiative transfer model (Yan et al., 2008). A method developed by Heymsfield and Westbrook (2010) is adopted to calculate snow particle terminal velocity. Finally, snowfall rate is computed by numerically solving a complex integral. NCEP CMORPH analysis has shown that integration of ATMS SFR has improved the performance of CMORPH-Snow. The ATMS SFR product is also being assessed at several NWS Weather Forecast Offices for its usefulness in weather forecast.
Williams, Terence M. [Department of Radiation Oncology, Ohio State University, Columbus, Ohio (United States); Nyati, Shyam [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Center for Molecular Imaging, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Ross, Brian D. [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Department of Radiology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Rehemtulla, Alnawaz, E-mail: firstname.lastname@example.org [Department of Radiation Oncology, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Center for Molecular Imaging, University of Michigan Medical Center, Ann Arbor, Michigan (United States); Department of Radiology, University of Michigan Medical Center, Ann Arbor, Michigan (United States)
Purpose: Ataxia telangiectasia mutated (ATM) is a serine/threonine kinase critical to the cellular DNA-damage response, including from DNA double-strand breaks. ATM activation results in the initiation of a complex cascade of events including DNA damage repair, cell cycle checkpoint control, and survival. We sought to create a bioluminescent reporter that dynamically and noninvasively measures ATM kinase activity in living cells and subjects. Methods and Materials: Using the split luciferase technology, we constructed a hybrid cDNA, ATM-reporter (ATMR), coding for a protein that quantitatively reports on changes in ATM kinase activity through changes in bioluminescence. Results: Treatment of ATMR-expressing cells with ATM inhibitors resulted in a dose-dependent increase in bioluminescence activity. In contrast, induction of ATM kinase activity upon irradiation resulted in a decrease in reporter activity that correlated with ATM and Chk2 activation by immunoblotting in a time-dependent fashion. Nuclear targeting improved ATMR sensitivity to both ATM inhibitors and radiation, whereas a mutant ATMR (lacking the target phosphorylation site) displayed a muted response. Treatment with ATM inhibitors and small interfering (si)RNA-targeted knockdown of ATM confirm the specificity of the reporter. Using reporter expressing xenografted tumors demonstrated the ability of ATMR to report in ATM activity in mouse models that correlated in a time-dependent fashion with changes in Chk2 activity. Conclusions: We describe the development and validation of a novel, specific, noninvasive bioluminescent reporter that enables monitoring of ATM activity in real time, in vitro and in vivo. Potential applications of this reporter include the identification and development of novel ATM inhibitors or ATM-interacting partners through high-throughput screens and in vivo pharmacokinetic/pharmacodynamic studies of ATM inhibitors in preclinical models.
This deliverable provides an overview of the current status of the European market for ATM services. The offer of ATM services by principal operators in Belgium, Denmark, Finland, France, Germany, Greece, Italy, Norway, Portugal, Spain, Sweden and United Kingdom is described. In addition, a number...... of international providers of ATM in Europe are presented....
Full Text Available This paper presents a real case of digital forensic analysis in organizational fraud auditing process investigated using two different forensic tools, namely Tableau TD3 Touch Screen Forensic Imager and Access Data FTK Imager. Fraud auditing is more of a mindset than a methodology and has different approaches from financial auditing. Fraud auditors are mostly focused on exceptions, accounting irregularities, and patterns of their conduct. Financial auditors place special emphasis on the audit trail and material misstatements. A fraud case investigation of non-cash misappropriations committed by an employee, the warehouseman, will be presented herein in order to highlight the usefulness of fraud auditing, which can reveal many forms of financial crime and can be used in both private and public sector companies. Due to the computerized accounting environment, fraud investigation requires a combination of auditing, computer crime and digital forensic investigation skills, which can be achieved through joint efforts and cooperation of both digital investigator and fraud auditor as proposed herein.
... 7 Agriculture 4 2010-01-01 2010-01-01 false Negligence or fraud. 276.3 Section 276.3 Agriculture... Negligence or fraud. (a) General. If FNS determines that there has been negligence or fraud on the part of..., pay to FNS a sum equal to the amount of coupons issued as a result of such negligence or fraud. (b...
Flávia Oliveira Santos de Sá Lisboa
Full Text Available A tendência atual de integração de serviços de dados, voz e vídeo, estimulada pelo pleno sucesso da Internet, aumentou a demanda por maior banda e melhor desempenho nas redes de comunicação de dados. Neste contexto, a tecnologia ATM (Asynchronous Transfer Mode vem sendo utilizada na implementação de backbone de LANs e WANs, justamente por oferecer a possibilidade de integração de serviços com qualidade, alta escalabilidade e altas taxas de transferência em banda larga. Neste artigo serão abordados os principais conceitos relacionados à tecnologia ATM, suas vantagens e desvantagens em face de outras tecnologias (como Fast e Gigabit Ethernet, além de casos de sua utilização em empresas e instituições de ensino.
Luoma, Marko; Ilvesmaeki, Mika
ATM has been under a thorough standardization process for more than ten years. Looking at it now, what have we achieved during this time period? Originally ATM was meant to be an easy and efficient protocol enabling varying services over a single network. What it is turning to be it `yet another ISDN'--network full of hopes and promises but too difficult to implement and expensive to market. The fact is that more and more `nice features' are implemented on the cost of overloading network with hard management procedures. Therefore we need to adopt a new approach. This approach keeps a strong reminder on `what is necessary.' This paper presents starting points for an alternative approach to the traffic management. We refer to this approach as `the minimum management principle.' Choosing of the suitable service classes for the ATM network is made difficult by the fact that the more services one implements the more management he needs. This is especially true for the variable bit rate connections that are usually treated based on the stochastic models. Stochastic model, at its best, can only reveal momentary characteristics in the traffic stream not the long range behavior of it. Our assumption is that ATM will move towards Internet in the sense that strict values for quality make little or no sense in the future. Therefore stochastic modeling of variable bit rate connections seems to be useless. Nevertheless we see that some traffic needs to have strict guarantees and that the only economic way of doing so is to use PCR allocation.
張, 影; ZHANG, Ying
The public company audit is expected to detect frauds in the financial reporting of entity. But, if senior management of corporation want to perpetrate frauds, the auditors have a risk of material misstatement due to fraud. In this paper, I consider the history of public company auditing to improve the prevention and detection of material fraud and to educate financial statement users about frauds in financial statement of American corporation and Japanese corporation. The history also is sho...
Agud, J L
Between 0% and 94% of university students acknowledge having committed academic fraud. Its forms are varied: cheating on examinations, submitting someone else's work, plagiarism, false citations, false reporting on experiments, tests or findings in the medical history and physical examination, unfair behavior toward fellow students, and many others. The consequences of academic fraud include learning corruption, useless efforts by students and faculty, incorrect performance evaluations and unfair selection for jobs. Since this can be a prelude to future fraud as doctors or researches, the prevalence, risk factors, motivations, clinical appearances, detection and prevention of the disease of academic fraud are here reviewed. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.
Full Text Available The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud. Anomaly detection plays a pivotal role in data mining since most outlying...
... a Glance Pre-Conference Programs Conference Sessions Registration Hotel & Travel Information Conference Tracks Credit Opportunities Anti-Fraud Expo Sponsors Programs Budget Adequately for 2018 Trainings NETS Webinars Launch Webinar ...
Braud, Chloé Elodie; Søgaard, Anders
The problem of detecting scientific fraud using machine learning was recently introduced, with initial, positive results from a model taking into account various general indicators. The results seem to suggest that writing style is predictive of scientific fraud. We revisit these initial experime......The problem of detecting scientific fraud using machine learning was recently introduced, with initial, positive results from a model taking into account various general indicators. The results seem to suggest that writing style is predictive of scientific fraud. We revisit these initial...... experiments, and show that the leave-one-out testing procedure they used likely leads to a slight over-estimate of the predictability, but also that simple models can outperform their proposed model by some margin. We go on to explore more abstract linguistic features, such as linguistic complexity...
Rajan Gupta; Nasib Singh Gill
Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement frau...
Full Text Available This paper focuses on detailing the general coordinates regarding tax evasion and the necessity of creating a common unitary European legal framework. Accounting information might mirror erroneously in a certain measure the micro to macroeconomic tendency of fraud by showing a gross image of available resources. It is of the utmost importance to become fully aware of causes for illicit practices, ways to fight any fraud attempts and to evaluate the accounting mechanism that both creates and identifies tax evasion.
Edward Wong Sek Khin
Full Text Available Internet fraud is increasing on a daily basis with new methods for extracting funds from government, corporations, businesses in general, and persons appearing almost hourly. The increases in on-line purchasing and the constant vigilance of both seller and buyer have meant that the criminal seems to be one-step ahead at all times. To pre-empt or to stop fraud before it can happen occurs in the non-computer based daily transactions of today because of the natural intelligence of the players, both seller and buyer. Currently, even with advances in computing techniques, intelligence is not the current strength of any computing system of today, yet techniques are available which may reduce the occurrences of fraud, and are usually referred to as artificial intelligence systems.This paper provides an overview of the use of current artificial intelligence (AI techniques as a means of combating fraud.Initially the paper describes how artificial intelligence techniques are employed in systems for detecting credit card fraud (online and offline fraud and insider trading.Following this, an attempt is made to propose the using of MonITARS (Monitoring Insider Trading and Regulatory Surveillance Systems framework which use a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing. Finally, the paper discusses future research agenda to the role of using MonITARS system.
Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and iiÂ visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: iÂ a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.
Full Text Available Fraud present an immense problem for health insurance companies and the only way to fight fraud is by using specialized fraud management systems. The current research community focussed great efforts on different fraud detection techniques while neglecting other also important activities of fraud management. We propose a holistic approach that focuses on all 6 activities of fraud management, namely, (1 deterrence, (2 prevention, (3 detection, (4 investigation, (5 sanction and redress, and (6 monitoring. The main contribution of the paper are 15 key characteristics of a fraud management system, which enable construction of a fraud management system that provides effective and efficient support to all fraud management activities. We base our research on literature review, interviews with experts from different fields, and a case study. The case study provides additional confirmation to expert opinions, as it puts our holistic framework into practice.
Winkler, Johannes; Hofmann, Kay; Chen, Shuhua
Conventional chemo- and radiotherapies for the treatment of cancer target rapidly dividing cells in both tumor and non-tumor tissues and can exhibit severe cytotoxicity in normal tissue and impair the patient's immune system. Novel targeted strategies aim for higher efficacy and tumor specificity. The role of ATM protein in the DNA damage response is well known and ATM deficiency frequently plays a role in tumorigenesis and development of malignancy. In addition to contributing to disease development, ATM deficiency also renders malignant cells heavily dependent on other pathways that cooperate with the ATM-mediated DNA damage response to ensure tumor cell survival. Disturbing those cooperative pathways by inhibiting critical protein components allows specific targeting of tumors while sparing healthy cells with normal ATM status. We review druggable candidate targets for the treatment of ATM-deficient malignancies and the mechanisms underlying such targeted therapies. PMID:27308314
Full Text Available The fraud and fiscal evasion phenomenon generate indisputable negative effects, which are felt directly on the level of fiscal receipts earnings, determining major distortions in the market’s functioning mechanism. If in the European Union, the contribution of the three large tax categories (direct tax, indirect and social contributions in forming revenue are relatively close, in Romania, fiscal and budget revenue are directly dependent on the indirect tax and duties, especially on VAT and various sales taxes. If there is reductions in the fiscal evasion as to what these taxes are concerned, the premises for creating budget resource needed to fund the economic growth are created. In judicial literature, tax evasion is considered as being the logic result of all defects and inadvertencies of an imperfect legislation, of broken application methods, as well as a lack of foreseeing and lack of skill on the law-maker’s side, with their excessive tax system is as guilty as those who contribute in creating it. Regardless of how this phenomenon is defined, fiscal evasion represents the lack of fulfillment by the taxpayer of his fiscal obligation. The field in which tax evasion acts is as widespread as the different taxes, manifesting especially in the direct and indirect taxes, influencing their efficiency.
Thornton, Dallas; Mueller, Roland; Schoutsen, Paulus; van Hillegersberg, Jos
It is estimated that approximately $700 billion is lost due to fraud, waste, and abuse in the US healthcare system. Medicaid has been particularly susceptible target for fraud in recent years, with a distributed management model, limited cross- program communications, and a difficult-to-track
Ricardo, Manuel; Ferreira, M. E. P.; Guimaraes, Francisco E.; Mamede, J.; Henriques, M.; da Silva, Jorge A.; Carrapatoso, E.
ATM network will support new multimedia services that will require new protocols, those services and protocols will need different test strategies and tools. In this paper, the concepts of functional and non-functional testers of ATM networks are discussed, a multimedia service and its requirements are presented and finally, a summary description of an ATM network and of the test tool that will be used to validate it are presented.
The article is aimed to ATM multiplexor computer model utilisation. Based on simulation runs we try to review aspects of use a synchronous and asynchronous ATM multiplexors. ATM multiplexor is the input queuing model with three inputs. Synchronous multiplexor works without an input priority. Multiplexor inputs are served periodically. Asynchronous multiplexor model supports several queuing and priority mechanisms. CLR and CTD are basic performance parameters. Input cell flows are genera...
K. R. Seeja
Full Text Available This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
Seeja, K R; Zareapoor, Masoumeh
This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
Braun, Torsten; Maehler, Martin
Virtual LANs (VLANs) allow to interconnect users over campus or wide area networks and gives the users the impression as they would be connected to the same local area network (LAN). The implementation of VLANs is based on ATM Forum's LAN Emulation and LAN/ATM switches providing interconnection of emulated LANs over ATM and the LAN ports to which the user's end systems are attached to. The paper discusses possible implementation architectures and describes advanced features such as ATM short-cuts, QoS, and redundancy concepts.
Zgheib, Omar; Huyen, Yentram; DiTullio, Richard A.; Snyder, Andrew; Venere, Monica; Stavridi, Elena S.; Halazonetis, Thanos D.
The ATM (mutated in Ataxia-Telangiectasia) protein kinase is an important player in signaling the presence of DNA double strand breaks (DSBs) in higher eukaryotes. Recent studies suggest that ATM monitors the presence of DNA DSBs indirectly, through DNA DSB-induced changes in chromatin structure. One of the proteins that sense these chromatin structure changes is 53BP1, a DNA damage checkpoint protein conserved in all eukaryotes and the putative ortholog of the S. cerevisiae RAD9 protein. We review here the mechanisms by which ATM is activated in response to DNA DSBs, as well as key ATM substrates that control cell cycle progression, apoptosis and DNA repair
Sun, Yingli; Xu, Ye; Roy, Kanaklata; Price, Brendan D.
The ATM protein kinase is essential for cells to repair and survive genotoxic events. The activation of ATM's kinase activity involves acetylation of ATM by the Tip60 histone acetyltransferase. In this study, systematic mutagenesis of lysine residues was used to identify regulatory ATM acetylation sites. The results identify a single acetylation site at lysine 3016, which is located in the highly conserved C-terminal FATC domain adjacent to the kinase domain. Antibodies specific for acetyl-ly...
Sun, Yingli; Du, Fengxia
The activation of ATM is critical in the DNA double strand breaks repair pathway. Acetylation of ATM by Tip60 histone acetyltransferase (HAT) plays a key role in the activation of ATM kinase activity in response to DNA damage. ATM forms a stable complex with Tip60 through the FATC domain of ATM. Tip60 acetylates lysine3016 of ATM, and this acetylation induces the activation of ATM. Several techniques are included in the study of ATM acetylation by Tip60, such as in vitro kinase assay, systematic mutagenesis, western blots. Here, we describe how to study the acetylation of ATM using acetylation-specific antibodies.
Pressure to conform to a sustainability agenda is coming from customers, investors, employees, industry bodies and the media. This agenda is evolving into a critical part of an organisation's business model, and their relationships, opening up new market opportunities and supporting cost efficiencies. But all changes in business activities also raise the risk of fraud and abuse. Sustainability is no exception. The potential for fraud tends to be greater in new markets, when information is imperfect, standards of measurement and verification are not harmonised and governance is weak. The sustainability marketplace, taken as a whole, is all of these things. To a large extent, the types of fraud appearing are not new. They represent the application of tried and tested fraudulent practices to the sustainability arena. A comprehensive and robust design, rather than an ad hoc, piecemeal approach, is essential for a successful sustainability strategy. An awareness of the risk of potential fraud and the need to incorporate measures to protect against it are part of that process. Sustainable business practices, including a company's mitigation and carbon markets activities, are disclosed as either financial or non-financial data. In this paper, PwC examines some of the green fraud risks that companies face when engaged in such activities and the steps they can take to mitigate or eliminate them.
Artur Filipe Ewald Wuerges
Full Text Available Financial statement fraud (FSF is costly for investors and can damage the credibility of the audit profession. To prevent and detect fraud, it is helpful to know its causes. The binary choice models (e.g. logit and probit commonly used in the extant literature, however, fail to account for undetected cases of fraud and thus present unreliable hypotheses tests. Using a sample of 118 companies accused of fraud by the Securities and Exchange Commission (SEC, we estimated a logit model that corrects the problems arising from undetected frauds in U.S. companies. To avoid multicollinearity problems, we extracted seven factors from 28 variables using the principal factors method. Our results indicate that only 1.43 percent of the instances of FSF were publicized by the SEC. Of the six significant variables included in the traditional, uncorrected logit model, three were found to be actually non-significant in the corrected model. The likelihood of FSF is 5.12 times higher when the firm’s auditor issues an adverse or qualified report.
Hansapangast õppelaenu soovivad üliõpilased saavad kontrollida internetipanga hanza.netìs, kas laenu saamiseks vajalikud tingimused on nende puhul täidetud ja esitada laenutaotluse hanza.netì või panga kodulehekülje kaudu : [täistekst] / DELFI-uudiseid vahendas Merike Määrits
Keefe, Barbara; Stockford, David
Governor Baxter School for the Deaf is one of six Maine pilot sites chosen by NYNEX to showcase asynchronous transfer mode (ATM) technology. ATM is a network connection that allows high bandwidth transmission of data, voice, and video. Its high speed capability allows for high quality two-way full-motion video, which is especially beneficial to a…
U.S. Department of Health & Human Services — Medicaid Fraud Control Units (MFCU or Unit) investigate and prosecute Medicaid fraud as well as patient abuse and neglect in health care facilities. OIG certifies,...
Exploring fraud triangle in understanding ethics pre-cautionary: a Malaysian ... Journal of Fundamental and Applied Sciences ... Various reports on the involvement of government officials in fraud cases indicate the lacking of ethical systems.
Maria Victoria Zunzunegui
Conclusion: The results suggest that financial fraud is detrimental to health. Further research should examine the mechanisms through which financial fraud impacts health. If our results are confirmed psychological and medical care should be provided, in addition to financial compensation.
S. van den Braak; R. Choenni; M.S. Bargh
Legal persons (i.e., entities such as corporations, companies, partnerships, firms, associations, and foundations) may commit financial crimes or employ fraudulent activities like money laundering, tax fraud, or bankruptcy fraud. Therefore, in the Netherlands legal persons are automatically screened
Full Text Available Abstract: Determinans of Fraud of Social Assistance Expenditure in Local Government. This study aims to analyze the determinants of fraud of social assistance expenditures in Local Government. This study use Partial Least Square (PLS as method while Strcutural Equation Modeling (SEM used as analytical tool. The sample is all local governement in Central Java The data used in this study are Auditor Report of BPK.The results show that the determinant of the fraud of social assistance expenditure is internal control system weaknesses and non-compliance with laws and regulations. Therefore, these two factor need attention from local government, regulator and auditor in order to prevent social assistance expenditure in future period.
Cai, Yuanfeng; Zhu, Dan
Background: The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers. However, it is vulnerable to rating fraud. Some raters may inject unfairly high or low ratings to the system so as to promote their own products or demote their competitors. Method: This study explores the rating fraud by differentiating the subjective fraud from objective fraud. Then it discusses the effectiveness of blockchain technology in objective f...
Ovidiu Constantin Bunget; Alin Constantin Dumitrescu
Responsibility for preventing and detecting fraud rest with management entities.Although the auditor is not and cannot be held responsible for preventing fraud and errors, in yourwork, he can have a positive role in preventing fraud and errors by deterring their occurrence. Theauditor should plan and perform the audit with an attitude of professional skepticism, recognizingthat condition or events may be found that indicate that fraud or error may exist.Based on the audit risk assessment, aud...
Chen, Jidong; Tao, Ye; Wang, Haoran; Chen, Tao
With development of mobile internet and finance, fraud risk comes in all shapes and sizes. This paper is to introduce the Fraud Risk Management at Alibaba under big data. Alibaba has built a fraud risk monitoring and management system based on real-time big data processing and intelligent risk models. It captures fraud signals directly from huge amount data of user behaviors and network, analyzes them in real-time using machine learning, and accurately predicts the bad users and transactions....
vonDeak, Thomas C.; Yegendu, Ferit
An important element of satellite-supported asynchronous transfer mode (ATM) networking will involve support for the routing and rerouting of active connections. Work published under the auspices of the Telecommunications Industry Association (http://www.tiaonline.org), describes basic architectures and routing protocol issues for satellite ATM (SATATM) networks. The architectures and issues identified will serve as a basis for further development of technical specifications for these SATATM networks. Three ATM network architectures for bent pipe satellites and three ATM network architectures for satellites with onboard ATM switches were developed. The architectures differ from one another in terms of required level of mobility, supported data rates, supported terrestrial interfaces, and onboard processing and switching requirements. The documentation addresses low-, middle-, and geosynchronous-Earth-orbit satellite configurations. The satellite environment may require real-time routing to support the mobility of end devices and nodes of the ATM network itself. This requires the network to be able to reroute active circuits in real time. In addition to supporting mobility, rerouting can also be used to (1) optimize network routing, (2) respond to changing quality-of-service requirements, and (3) provide a fault tolerance mechanism. Traffic management and control functions are necessary in ATM to ensure that the quality-of-service requirements associated with each connection are not violated and also to provide flow and congestion control functions. Functions related to traffic management were identified and described. Most of these traffic management functions will be supported by on-ground ATM switches, but in a hybrid terrestrial-satellite ATM network, some of the traffic management functions may have to be supported by the onboard satellite ATM switch. Future work is planned to examine the tradeoffs of placing traffic management functions onboard a satellite as
Helton, Jeffrey R
Fraud associated with electronic health records (EHRs) generally falls into two categories: inappropriate billing by healthcare providers and inappropriate access by a system's users. A provider's EHR system requires controls to be of any significant help in detecting such fraudulent activity, or in gathering transactional evidence should such activity be identified. To protect against potential EHR-related healthcare fraud, providers should follow the recommendations established in 2007 by RTI International for the Office of the National Coordinator for Health Information Technology of the U.S. Department of Health and Human Services.
Silvis, I.C.J.; Ruth, van S.M.; Fels, van der Ine; Luning, P.A.
Recent scandals have increased the need to strengthen companies’ ability to combat fraud within their own organizations and across their supply chain. Vulnerability assessments are a first step towards the inventory of fraud vulnerability and fraud mitigation plans. Spices are reported frequently
..., Compensation, and Dependency and Indemnity Compensation Forfeiture § 3.901 Fraud. (a) Definition. An act... death benefit payable. (2) Amount of compensation payable but for the forfeiture. No benefits are... affidavit, declaration, certificate, statement, voucher, or paper, concerning any claim for benefits under...
Porkess, Roger; Mason, Stephen
This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)
Linke, Kristina Gisela Babette
Verslaggevingsfraude is het manipuleren van de boekhouding om betere cijfers te laten zien. Kristina Linke onderzocht deze vorm van fraude, waarbij zij vooral keek naar de rol van de controller. Dat gebeurde aan de hand van 244 aanklachten in de periode 2000-2006 in de Verenigde Staten. Uit het
Leemann, Lucas; Bochsler, Daniel
, we propose a more encompassing approach, testing for several empirical implications of different possible forms of fraud. To illustrate this approach we rely on a case of electoral irregularities in one of the oldest democracies: In a Swiss referendum in 2011, one in twelve municipalities irregularly...
Baker, C. Richard
Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)
Owolabi, S. A. - Accounting Department, Babcock University, Nigeria. E-mail: ... Abstract. The paper reviews the various forms of fraudulent practice their impact and ... legislations targeted at reducing fraud and introducing some forms of control .... money market and treasury, risk assets, information technology, financial.
Nkotagu, Gabriel Hudson
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Ethics CPD Supplement: Ethics in health care: Healthcare Fraud. S10. Vol 56 No 1 Supplement 1. S Afr Fam Pract 2014. Introduction. Vintage images are easily found depicting a virtuous doctor with a look of honesty and compassion on his or her face bending over a patient, stethoscope in hand, ready to perform a clinical ...
Kurz, Ebba U; Lees-Miller, Susan P
Ataxia-telangiectasia mutated (ATM) is a serine/threonine protein kinase that acts as a master switch controlling the cell cycle in response to ionizing radiation-induced DNA double-strand breaks (DSBs...
Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus
Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic...
Kurz, Ebba U; Lees-Miller, Susan P
Ataxia-telangiectasia mutated (ATM) is a serine/threonine protein kinase that acts as a master switch controlling the cell cycle in response to ionizing radiation-induced DNA double-strand breaks (DSBs...
Crosby, S.; Rooney, S.; Isaacs, R.; Bos, H.J.
Contrary to the initial high expectations, ATM failed to become the universal network technology covering all services and running from the desktop to the back-bone. This paper tries to identify the technological problems that contributed to this failure.
Chen, H.; Tsang, R.; Brandt, J.; Hutchins, J.
Over the past decade, the Internet has burgeoned into a worldwide information highway consisting of approximately 5 million hosts on over 45,000 interconnected networks. This unprecedented growth, together with the introduction of multimedia workstations, has spurred the development of innovative applications that require high speed, low latency, and real-time transport. Today`s Internet can neither scale in its bandwidth nor guarantee the Quality of Services (QoS) necessary to meet these performance requirements. Many network researchers propose to use the Asynchronous Transfer Mode (ATM) technology as the underlying infrastructure for the next generation of workgroup, campus, and enterprise IP networks. Since ATM is significantly different from today`s legacy network technologies, efficient implementation of IP over ATM is especially challenging. This tutorial paper covers several existing proposals that integrate IP over ATM.
Full Text Available This study attempts to integrate ethical values into the fraud triangle theory in the context of Malaysian banking industry. Primary data were collected through the survey of 108 questionnaires administered to the employees of the top three largest banks in Malaysia. The findings revealed that ethical values were negatively related to employee fraud, and two elements of fraud triangle theory, namely, opportunity and rationalization, were positively related to employee fraud. This implies that high ethical value is crucial to mitigate employee fraud. To minimize employee fraud, the banking industry should reduce opportunities and employee negative rationalization through strong internal control. This study contributes to literature on the occurrences of employee fraud, which is not widely discussed, especially in the context of the banking industry in developing countries.
Yang, Chunying; Tang, Xi; Guo, Xiaojing; Niikura, Yohei; Kitagawa, Katsumi; Cui, Kemi; Wong, Stephen T.C.; Fu, Li; Xu, Bo
The ATM kinase plays a critical role in the maintenance of genetic stability. ATM is activated in response to DNA damage and is essential for cell cycle checkpoints. Here, we report that ATM is activated in mitosis in the absence of DNA damage. We demonstrate that mitotic ATM activation is dependent on the Aurora-B kinase and that Aurora-B phosphorylates ATM on serine 1403. This phosphorylation event is required for mitotic ATM activation. Further, we show that loss of ATM function results in...
Full Text Available During the last year we had observed different types of misconduct in the submitted manuscripts into the editorial office. Those are included attempted theft of data, presence of ghost authors, gift authorship, dual submissions, salami publications, falsification and some other types of fraud. Our analysis in the editorial office led us to conclude that research fraud is an important issue and should be discussed clearly. The emphasis on competition and pressure to produce published materials, while internal intention to discover the scientific truth may foster a conflict between personal career goals and human intellectual motivation; finally may induce research misconduct. Having accurate and good knowledge in this field is mandatory for researchers especially the younger ones. In the first part of this article we will discuss a short but important part of the history of this problem and in the second part definition and editorial response will be reviewed
Park, R. L.
Ancient beliefs in demons and magic still sweep across the modern landscape, but they are now dressed in the language and symbols of science. This is pseudoscience. At least in the beginning, its practitioners may believe it to be science, just as witches and faith healers may truly believe they can call forth supernatural powers. What may begin as honest error, however, has a way of evolving through almost imperceptible steps from self-delusion to fraud.
Emilia Cornelia STOICA
Full Text Available Tax optimization, often called legal tax evasion is the use of methods and techniques that are within the law, in order to reduce or even cancel the tax liability. To achieve such an approach, the taxpayer or his advisers must know in depth the tax law - and by extension, the financial and administrative law - and, moreover, must be functional tax jurisdictions which allow the use of appropriate assemblies. The recent leasks, as WikiLeaks, LuxLeaks, SwissLeaks, Panama Papers etc. on financial flows to tax havens highlight the far-reaching unprecedented evasion and tax fraud, both in the amounts involved - trillions of dollars - and sophisticated assemblies used primarily by multinational companies to the detriment of the public finances of Member territory headquarters and branches which are located and, therefore, detrimental economic and social life of those countries. Tax evasion is based on legal mechanisms which, combined together in the montages of increasingly complex, allowing operators, mostly multinational legal entities to circumvent national tax law and not pay the taxes due. The border between tax optimization, tax evasion and fraud is very thin, optimization using various legal methods to reduce the tax owed, whereas tax evasion using illegal means, which covered crime. Tax evasion reveals either optimize or fraud. There is a significant international dimension of tax evasion because it is favored by multinational corporations operating conditions.
Joshua Onome Imoniana
Full Text Available This study is aimed at analyzing the characteristics of forensic accounting services performed by the accounting firms in Brazil, using an exploratory approach. At the end, performs a discourse analysis on a speech proffered by the CEO of one of the key players of forensic accounting service provider (Kroll in Brazil. In order to orientate this reflection, we pose the following question: what is the characteristic of forensic accounting that substantiates it as professional accountants’ innovation to curb corporate accounting malpractices? In this intent, we accept the premise that the bone of contention in some unhealthy business environment is the inability of auditor to track frauds. We used the icons (categories and/or nodes that dynamically represent formalism in the theory of self re-production to explain the patterns met in the speech. Our finding makes us to conclude that the idea that frauds have been least detected by auditors begins to gain shape as auditors are more adequately trained to detect fraud instead of emphasizing the traditional segregation of duties and safeguard of assets.
Full Text Available We have appreciated that this paper can be structured in four chapters that will explain the inevitable negative effects generated by tax and fiscal fraud, which are felt in the level of fiscal revenue, determining major malfunctions in the mechanism of the markets. In the economic reality and in the rise of the tax fraud phenomenon, in the contemporary fiscal doctrine it is stated that the public desiderate of “loyal collaboration between the tax payer and the revenue agency” with the purpose of correctly setting taxes and tariffs and other required fund needed for creating public interest monetary funds. The economic, social and political globalization tendencies of the last decade have stimulated and supported actions relating to eluding the fiscal dispositions, actions which have moved more and more from the center of the national fiscal system towards the exterior, outside the field of action of the national fiscal law. In this regard show that reducing fiscal evasion, allows the creation of budgetary resources, necessary for funds allocation for economical growth. In Romania, one of the basic economic problems is the lack of investment resources allocated, these being the main contributor to economic growth, in which the reduction of fraud and tax evasion is the solution to increase this allocation which can be rated as one of the priority tasks of the state.
Full Text Available In the last decades, tax fraud has grown, being catalogued as a serious impediment in the way of economic development. The paper aims to make contributions on two levels: a Theoretical level - by synthesis methodologies for estimating tax fraud and b Empirical level - by analyzing fraud mechanisms and dynamics of this phenomenon, properly established methodologies. To achieve the objective, we have appealed to the qualitative and quantitative analysis. Whatever the context that generates tax fraud mechanisms, the ultimate goal of fraudsters is the same: total or partial avoidance of taxation, respectively obtaining public funds unduly. The increasing complexity of business (regarded as a tax base and failure to adapt prompt of legal regulations to new contexts have allowed diversification and “improving” the mechanisms of fraud, creating additional risks for accuracy estimates of tax fraud.
Full Text Available The field of tax evasion has generally been the subject of research at different levels on a number of occasions. However, reality demonstrates that tax fraud today is far from being properly and completely perceived, so the mechanisms designed to prevent and combat it are far from being effective.Tax evasion is a very difficult concept to express, and there is no clear definition of tax fraud. When it comes to fraud, there is also talk of legal or legitimate fraud, illegal fraud, international evasion, legal and illegal evasion, tax havens or refugees, abuse of the right to flee to the tax, freedom to choose the least taxed way, or fiscal underestimation, law fraud or underground economy.
Fredette, Andre N.
Multiprotocol over ATM (MPOA) is a new protocol specified by the ATM Forum. MPOA provides a framework for effectively synthesizing bridging and routing with ATM in an environment of diverse protocols and network technologies. The primary goal of MPOA is the efficient transfer of inter-subnet unicast data in a LAN Emulation (LANE) environment. MPOA integrates LANE and the next hop resolution protocol (NHRP) to preserve the benefits of LAN Emulation, while allowing inter-subnet, internetwork layer protocol communication over ATM VCCs without requiring routers in the data path. It reduces latency and the internetwork layer forwarding load on backbone routers by enabling direct connectivity between ATM-attached edge devices (i.e., shortcuts). To establish these shortcuts, MPOA uses both routing and bridging information to locate the edge device closest to the addressed end station. By integrating LANE and NHRP, MPOA allows the physical separation of internetwork layer route calculation and forwarding, a technique known as virtual routing. This separation provides a number of key benefits including enhanced manageability and reduced complexity of internetwork layer capable edge devices. This paper provides an overview of MPOA that summarizes the goals, architecture, and key attributes of the protocol. In presenting this overview, the salient attributes of LANE and NHRP are described as well.
Health ATMs are terminals which are connected to a centrally located database storing patients' electronic healthcare records (EHR). These machines are capable of collecting information in a far superior fashion than humans and are also able to rectify obsolete data in a manner that humans are generally not inclined to. The main goal of this study is to assess the importance of adopting health ATMs in the Kingdom of Saudi Arabia (KSA), which can improve the confidence of patients, reward health self-management, and achieve positive health outcomes through their easy-to-use applications that are secure and accessible through various devices. Strength, Weakness, Opportunity, and Threat (SWOT) analysis was used to assess the efficiency of adopting health ATMs in KSA and reveal the said characteristics. Three focus groups assembled in the cities of Riyadh, Jeddah and Dammam during the period 2013-2014. The groups consisted of individuals experienced in the function of health ATMs. It was found that the sector possessed a number of strengths that would help it in reaching the goals outlined therein, thereby achieving successful outcomes. Health ATMs could be a promising new advancement in the field of health if the project were to be planned and implemented correctly. Their benefits would consequently reach organizational and national levels. It is, therefore, crucial to educate the project managers about the benefits of learning from others as well as educating them about the needs and the requirements of the concerned organization.
Horvat Ivan; Pejić Bach Mirjana; Merkač Skok Marjana
Background: Fraud attempts create large losses for financing subjects in modern economies. At the same time, leasing agreements have become more and more popular as a means of financing objects such as machinery and vehicles, but are more vulnerable to fraud attempts. Objectives: The goal of the paper is to estimate the usability of the data mining approach in discovering fraud in leasing agreements. Methods/Approach: Real-world data from one Croatian leasing firm was used for creating tow mo...
might keep the organization from achieving its objectives and analyze risks , including fraud risk , so as to decide how the risk should be managed ( COSO ...internal control to adequately manage the risk ( COSO , 2013). Risk management involves developing the effective internal control targeted at a...structure and management . While the risk of fraud cannot be eliminated entirely, it can be greatly reduced with an appropriate procurement fraud prevention
Sithic, H. Lookman; Balasubramanian, T.
With an increase in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection has become an emerging topics of great importance for academics, research and industries. Financial fraud is a deliberate act that is contrary to law, rule or policy with intent to obtain unauthorized financial benefit and intentional misstatements or omission of amounts by deceiving users of financial statements, especially investors and creditors. Data mining tec...
Rahman, Mizanur; Recabarren, Ruben; Carbunar, Bogdan; Lee, Dongwon
The profitability of fraud in online systems such as app markets and social networks marks the failure of existing defense mechanisms. In this paper, we propose FraudSys, a real-time fraud preemption approach that imposes Bitcoin-inspired computational puzzles on the devices that post online system activities, such as reviews and likes. We introduce and leverage several novel concepts that include (i) stateless, verifiable computational puzzles, that impose minimal performance overhead, but e...
Economic crime is always actual theme, even more when economy finds itself in crisis. It is a well-known fact, that in such times fraud risk increases even inside organizations. This thesis is dealing with economic crime from the perspective of auditor and fraud examiner and likewise in the terms of Czech criminal law. Fraud, as both professions call economic criminality, implies higher costs for organizations, that's why both private and government sector organizations strives to fight it. S...
Jiwon Seo; Mendelevitch, Ofer
Healthcare industry is growing at a rapid rate to reach a market value of $7 trillion dollars world wide. At the same time, fraud in healthcare is becoming a serious problem, amounting to 5% of the total healthcare spending, or $100 billion dollars each year in US. Manually detecting healthcare fraud requires much effort. Recently, machine learning and data mining techniques are applied to automatically detect healthcare frauds. This paper proposes a novel PageRank-based algorithm to detect healthcare frauds and anomalies. We apply the algorithm to Medicare-B dataset, a real-life data with 10 million healthcare insurance claims. The algorithm successfully identifies tens of previously unreported anomalies.
Flegel, Ulrich; Kerschbaum, Florian; Miseldine, Philip; Monakova, Ganna; Wacker, Richard; Leymann, Frank
One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered. They circumvent internal controls in place to prevent this kind of fraud, such as a goods receipt, e.g., by ordering services instead of goods. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud, but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.
Full Text Available This study explores how audit firms in Jordan deal with the presence of fraud risk factors in audit clients. In doing so, the study seeks to explore which fraud risk factors are more important to Jordanianauditors, and how Jordanian auditors consider modifying their audit programmes when fraud risk factors are present in clients. The study uses a structured questionnaire that was administered to seniorlevel auditors in the largest Jordanian audit firms. The findings show that almost all of the 20 fraud risk factors included in the questionnaire were only slightly important (if not unimportant, a finding that is arguably alarming. The perceived importance of modifying the audit programme in the presence of each fraud risk factor was related to the perceived importance of the fraud risk factor itself. However, changes in the nature and extent of audit procedures were more important than changes in the timing of the procedures or the members of the audit team. The most important fraud risk factors were related to the characteristics of management and its attitude towards the audit, while the least important fraud risk factors were related to the difficulties in the client’s financial performance. Factor analysis found that the fraud risk factors could be classified into four separate groups. Possible interpretations of the findings were discussed, such as considering the Jordanian business environment characteristics, and the findings were compared to those of extant international studies.
Lavin, M.F.; Khanna, K.K.; Waters, D.
Full text: Radiosensitivity is a universal characteristic of ataxia-telangiectasia (A-T), observed after exposure of patients and of cells in culture to radiation. This sensitivity is manifested as higher levels of radiation-induced chromosomal aberrations and reduced survival compared to controls. The gene for A-T was mapped to chromosome 11q 22-23 seven years ago and more recently we have been involved in the cloning of a single gene, ATM (ataxia-telangiectasia mutated), mutated in this syndrome. ATM is a large gene, approximately 150 kb in size, composed of 66 exons and codes for a major mRNA of 13 kb with a predicted open reading frame of 9.135 kb. It is not yet known what activity the ATM gene product possesses, but the ralatedness of this gene sequence to the phosphatidylinositol 3-kinase gene family supports a role for ATM in intracellular signalling. Considerable information is already available on defective signalling through the p53 damage-inducible pathway in A-T. This includes failure to arrest at either the G1/S or G2/M checkpoints as well as radioresistant DNA synthesis. A reduced and/or delayed response in the induction of p53 after exposure of A-T cells to ionizing radiation can account for the defective G1/S checkpoint. More recently we have demonstrated that the ATM gene product is involved in the control of multiple cell cycle checkpoints. Antibodies prepared against ATM peptides demonstrate the presence of a protein 350 kDa in size, which is the predicted size for this protein based on open reading frame of 9 kb. This protein is present both in the nucleus and in the cytoplasm where it is present in vesicular structures. As expected from mutation data the ATM protein is absent in cells from some patients with A-T. The cloning of the ATM gene will allow for screening of radiosensitive patients for mutations in this gene and will provide a means of identifying interacting proteins and thus an understanding of how it functions
Marcelo Silva Freitas
Com o recente desenvolvimento de tecnologias de redes de altas taxas de transmissão, tais como Asynchronous Transfer Mode (ATM), o problema da carência por largura de banda foi solucionado. A questão atual é a implementação de sistemas que suportem os protocolos ATM de forma nativa e integral. Atualmente tem-se utilizado aplicativos tradicionais baseados nos protocolos TCP(UDP)/IP no topo da pilha de protocolos ATM. Tal modelo traz redundâncias que implicam diretamente em aumento de overhead ...
Frew, Russell; Cannavan, Andrew
Horse meat in your beef burger. Melamine in milk powder. Dilution of your superior-quality honey, whiskey, fruit juice or rice with inferior substitutes. Reports of food fraud make regular headlines in the media, but how big is the problem? It is very difficult to say because one of the objectives of the deception perpetrated on consumers is to avoid detection, but an estimate by the World Customs Organisation puts the cost of food fraud at US $49 billion annually. There are many different types of food fraud, but two have particular food safety implications; economically motivated adulteration (EMA), and substitution. A Federal Register Notice 2 of a 2009 FDA Open Meeting defines EMA as “The fraudulent, intentional substitution or addition of a substance in a product for the purpose of increasing the apparent value of the product or reducing the cost of its production, i.e., for economic gain. EMA includes dilution of products with increased quantities of an already-present substance (e.g., increasing inactive ingredients of a drug with a resulting reduction in strength of the finished product, or watering down of juice) to the extent that such dilution poses a known or possible health risk to consumers, as well as the addition or substitution of substances in order to mask dilution.” The investment by producers in technology to ensure safety and quality should result in higher prices and greater market access for their produce. The higher prices, however, provide the motivation for fraudsters. When a fraudster puts a genuine producer’s label on a cheaper product to pass it off as the higher quality article the result is, at the very least, a loss of sale for the genuine producer. If the consumer has a bad experience with the item, brand damage will result and possibly even liability for recall or response
Written and edited by known experts in the field, the content is indeed of high quality and very informative. The logical structure and writing style are excellent, which is a challenging task when there are so many contributors. The book is a must-read for several reader categories. I strongly recommend some of the technical chapters to advanced undergraduate and graduate computer science students. Law students can use the book to grasp the necessary technical background material for investigating cyber fraud. Finally, it is also for readers who wish to learn about the current state of
Aranda de Miguel, Jorge
RESUMEN: En la actualidad, el fraude académico constituye un serio problema para toda la comunidad universitaria. Herramientas de detección automatizadas pueden ser de gran utilidad para los docentes a la hora de detectar estos casos. El objeto de estudio de este proyecto es tratar de conocer la mejor manera de resolver el problema de la detección del plagio, así como conocer y explicar las diversas técnicas conocidas que existen para analizar el lenguaje humano y lenguajes de programación...
Thornton, Dallas; Brinkhuis, Michel; Amrit, Chintan; Aly, Robin
Today, the over $2 trillion US healthcare system is ravaged by fraud, waste, and abuse, with an estimated one-third of all these costs frivolously spent in such ways. Sun Tzu wrote, "Every battle is won or lost before it's ever fought." To combat healthcare fraud, we must understand it and the forms
... STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or dishonesty” shall be deemed to encompass all those risks of loss that might arise through dishonest or...
The paper reviews the various forms of fraudulent practice their impact and inducement for various reforms in banking industry. It also mentions various legislations targeted at reducing fraud and introducing some forms of control and reporting systems. Various theories of fraud are examined and detailed analysis of various ...
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Penalties for fraud. 410.699a Section 410.699a Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969... Review, Finality of Decisions, and Representation of Parties § 410.699a Penalties for fraud. The penalty...
Internet fraud is one of the most rapidly increasing forms of cybercrime. It has become rampant among students generally because they make use of different Internet devices in schools. The purpose of this study was to examine the factors responsible for students' involvement in Internet fraud as expressed by tertiary ...
Full Text Available With development of mobile internet and finance, fraud risk comes in all shapes and sizes. This paper is to introduce the Fraud Risk Management at Alibaba under big data. Alibaba has built a fraud risk monitoring and management system based on real-time big data processing and intelligent risk models. It captures fraud signals directly from huge amount data of user behaviors and network, analyzes them in real-time using machine learning, and accurately predicts the bad users and transactions. To extend the fraud risk prevention ability to external customers, Alibaba also built up a big data based fraud prevention product called AntBuckler. AntBuckler aims to identify and prevent all flavors of malicious behaviors with flexibility and intelligence for online merchants and banks. By combining large amount data of Alibaba and customers', AntBuckler uses the RAIN score engine to quantify risk levels of users or transactions for fraud prevention. It also has a user-friendly visualization UI with risk scores, top reasons and fraud connections.
This document describes the Software Configuration Management (SCM) approach and procedures to be utilized in developing and maintaining the Automated Transportation Management System (ATMS). The configuration management procedures are necessary to ensure that any changes made to software and related documentation are consistent with ATMS goals and contained securely in a central library. This plan applies to all software and associated documentation used in producing ATMS V1.0 and ATMS V2.0 system
Full Text Available Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one. Due to the increase of credit card usage, the frauds associated with this have also increased. There are a lot of approaches used to detect the frauds. In this paper, behavior based classification approach using Support Vector Machines are employed and efficient feature extraction method also adopted. If any discrepancies occur in the behaviors transaction pattern then it is predicted as suspicious and taken for further consideration to find the frauds. Generally credit card fraud detection problem suffers from a large amount of data, which is rectified by the proposed method. Achieving finest accuracy, high fraud catching rate and low false alarms are the main tasks of this approach.
Yunsen; Chen; Song; Zhu; Yutao; Wang
Receiving punishment from regulators for corporate fraud can affect financing contracts between a firm and its bank,as both the firm’s credit risk and information risk increase after punishment By focusing on Chinese firms’borrowing behavior after events of corporate fraud,we find that firms’bank loans after punishment are not only significantly lower,but are also less than those for non-fraudulent firms.In addition,loan interest rates after punishment are not only higher than before,but also higher than those for their non-fraudulent counterparts.In addition,we find that corporate fraud indirectly destabilizes the"performance-bank loan"relationship.Our results suggest that corporate fraud negatively affects a firm’s ability to source debt financing,which provides new evidence about the economic consequences of fraud.
Peter J. Best
Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for â€˜red flagsâ€™, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.
Full Text Available Receiving punishment from regulators for corporate fraud can affect financing contracts between a firm and its bank, as both the firm’s credit risk and information risk increase after punishment. By focusing on Chinese firms’ borrowing behavior after events of corporate fraud, we find that firms’ bank loans after punishment are not only significantly lower, but are also less than those for non-fraudulent firms. In addition, loan interest rates after punishment are not only higher than before, but also higher than those for their non-fraudulent counterparts. In addition, we find that corporate fraud indirectly destabilizes the “performance-bank loan” relationship. Our results suggest that corporate fraud negatively affects a firm’s ability to source debt financing, which provides new evidence about the economic consequences of fraud.
Villaruz, Liza C; Jones, Helen; Dacic, Sanja; Abberbock, Shira; Kurland, Brenda F; Stabile, Laura P; Siegfried, Jill M; Conrads, Thomas P; Smith, Neil R; O'Connor, Mark J; Pierce, Andrew J; Bakkenist, Christopher J
Lung cancer is the leading cause of cancer-related mortality in the USA and worldwide, and of the estimated 1.2 million new cases of lung cancer diagnosed every year, over 30% are lung adenocarcinomas. The backbone of 1st-line systemic therapy in the metastatic setting, in the absence of an actionable oncogenic driver, is platinum-based chemotherapy. ATM and ATR are DNA damage signaling kinases activated at DNA double-strand breaks (DSBs) and stalled and collapsed replication forks, respectively. ATM protein is lost in a number of cancer cell lines and ATR kinase inhibitors synergize with cisplatin to resolve xenograft models of ATM-deficient lung cancer. We therefore sought to determine the frequency of ATM loss in a tissue microarray (TMA) of lung adenocarcinoma. Here we report the validation of a commercial antibody (ab32420) for the identification of ATM by immunohistochemistry and estimate that 61 of 147 (41%, 95% CI 34%-50%) cases of lung adenocarcinoma are negative for ATM protein expression. As a positive control for ATM staining, nuclear ATM protein was identified in stroma and immune infiltrate in all evaluable cases. ATM loss in lung adenocarcinoma was not associated with overall survival. However, our preclinical findings in ATM-deficient cell lines suggest that ATM could be a predictive biomarker for synergy of an ATR kinase inhibitor with standard-of-care cisplatin. This could improve clinical outcome in 100,000's of patients with ATM-deficient lung adenocarcinoma every year.
Littman, Marlyn Kemper
In this paper, the fundamental characteristics and capabilities of ATM (Asynchronous Transfer Mode) networks in a distance learning environment are examined. Current and projected ATM applications are described, and issues and challenges associated with developing ATM networking solutions for instructional delivery are explored. Other topics…
Weidert, R.S., Westinghouse Hanford
The Automated Transportation Management System (ATMS) Software Project Management plan (SPMP) is the lead planning document governing the life cycle of the ATMS and its integration into the Transportation Information Network (TIN). This SPMP defines the project tasks, deliverables, and high level schedules involved in developing the client/server ATMS software.
Darrah, Eric J; Stoltz, Kyle P; Ledwith, Mitchell; Tarakanova, Vera L
Ataxia-Telangiectasia mutated (ATM) kinase participates in multiple networks, including DNA damage response, oxidative stress, and mitophagy. ATM also supports replication of diverse DNA and RNA viruses. Gammaherpesviruses are prevalent cancer-associated viruses that benefit from ATM expression during replication. This proviral role of ATM had been ascribed to its signaling within the DNA damage response network; other functions of ATM have not been considered. In this study increased type I interferon (IFN) responses were observed in ATM deficient gammaherpesvirus-infected macrophages. Using a mouse model that combines ATM and type I IFN receptor deficiencies we show that increased type I IFN response in the absence of ATM fully accounts for the proviral role of ATM during gammaherpesvirus replication. Further, increased type I IFN response rendered ATM deficient macrophages more susceptible to antiviral effects of type II IFN. This study identifies attenuation of type I IFN responses as the primary mechanism underlying proviral function of ATM during gammaherpesvirus infection. Copyright © 2017 Elsevier Inc. All rights reserved.
Di Siena, Sara; Campolo, Federica; Gimmelli, Roberto; Di Pietro, Chiara; Marazziti, Daniela; Dolci, Susanna; Lenzi, Andrea; Nussenzweig, Andre; Pellegrini, Manuela
Hereditary deficiencies in DNA damage signaling are invariably associated with cancer predisposition, immunodeficiency, radiation sensitivity, gonadal abnormalities, premature aging, and tissue degeneration. ATM kinase has been established as a central player in DNA double-strand break repair and its deficiency causes ataxia telangiectasia, a rare, multi-system disease with no cure. So ATM represents a highly attractive target for the development of novel types of gene therapy or transplantation strategies. Atm tamoxifen-inducible mouse models were generated to explore whether Atm reconstitution is able to restore Atm function in an Atm-deficient background. Body weight, immunodeficiency, spermatogenesis, and radioresistance were recovered in transgenic mice within 1 month from Atm induction. Notably, life span was doubled after Atm restoration, mice were protected from thymoma and no cerebellar defects were observed. Atm signaling was functional after DNA damage in vivo and in vitro. In summary, we propose a new Atm mouse model to investigate novel therapeutic strategies for ATM activation in ataxia telangiectasia disease.
Clarke, R.A.; Fang, Z.H.; Marr, P.J.; Kearsley, J.H.; Papadatos, G.; Lee, C.S.; University of Sydney, Camperdown, NSW
ATM induction insufficiency in a radiosensitive breast-cancer patient The ataxia telangiectasia (A-T) gene (ATM) is a dominant breast cancer gene with tumour suppressor activity. ATM also regulates cellular sensitivity to ionising radiation (IR) presumably through its role as a facilitator of DNA repair. In normal cells and tissues the ATM protein is rapidly induced by IR to threshold/maximum levels. The kinase function of the ATM protein is also rapidly activated in response to IR. The fact that women carriers of ATM mutations can have an increased risk of developing breast cancer and that many sporadic breast tumours have reduced levels of the ATM protein broadens the scope of ATM's tumour suppressor within the breast. This report describes the downregulation of ATM protein levels in a radiosensitive breast cancer patient. Postinduction ATM levels were up to tenfold lower in the patient's fresh tissues compared to normal controls. These results might indicate a much broader role for ATM anomalies in breast cancer aetiology. Copyright (2002) Blackwell Science Pty Ltd
Christiansen, Henning; Kvols, Kenn
The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access ...... to the bus, it is shown that consecutive service times of the local access queue are correlated. Two models, one of which includes the correlation, are presented. The correlation effect is illustrated and the models are evaluated by means of a number of simulation cases......The cell loss ratio and cell delay variation of a distributed-queue dual-bus (DQDB) network receiving traffic from a number of asynchronous transfer mode (ATM) connections are considered. Every connection carries either connection oriented or connectionless traffic. In the analysis of the access...
Lee, Hong-Jen; Lan, Li; Peng, Guang; Chang, Wei-Chao; Hsu, Ming-Chuan; Wang, Ying-Nai; Cheng, Chien-Chia; Wei, Leizhen; Nakajima, Satoshi; Chang, Shih-Shin; Liao, Hsin-Wei; Chen, Chung-Hsuan; Lavin, Martin; Ang, K Kian; Lin, Shiaw-Yih; Hung, Mien-Chie
Ataxia telangiectasia mutated (ATM) mediates DNA damage response by controling irradiation-induced foci formation, cell cycle checkpoint, and apoptosis. However, how upstream signaling regulates ATM is not completely understood. Here, we show that upon irradiation stimulation, ATM associates with and is phosphorylated by epidermal growth factor receptor (EGFR) at Tyr370 (Y370) at the site of DNA double-strand breaks. Depletion of endogenous EGFR impairs ATM-mediated foci formation, homologous recombination, and DNA repair. Moreover, pretreatment with an EGFR kinase inhibitor, gefitinib, blocks EGFR and ATM association, hinders CHK2 activation and subsequent foci formation, and increases radiosensitivity. Thus, we reveal a critical mechanism by which EGFR directly regulates ATM activation in DNA damage response, and our results suggest that the status of ATM Y370 phosphorylation has the potential to serve as a biomarker to stratify patients for either radiotherapy alone or in combination with EGFR inhibition. PMID:25601159
She, Hua; Mao, Zixu
The phosphatidylinositol-3-kinase-like kinase ATM (ataxia-telangiectasia mutated) plays a central role in coordinating the DNA damage responses including cell cycle checkpoint control, DNA repair, and apoptosis. Mutations of ATM cause a spectrum of defects ranging from neurodegeneration to cancer predisposition. We previously showed that Cdk5 (cyclin-dependent kinase 5) is activated by DNA damage and directly phosphorylates ATM at serine 794 in postmitotic neurons. Phosphorylation at serine 794 precedes and is required for ATM autophosphorylation at serine 1981, and activates ATM kinase activity. Cdk5-ATM pathway plays a crucial role in DNA damage-induced neuronal injury. This chapter describes protocols used in analyzing ATM phosphorylation by Cdk5 in CGNs (cerebellar granule neurons) and its effects on neuronal survival.
Stern, L.A.; Circone, S.; Kirby, S.H.; Durham, W.B.
A "pressure-release" method that enables reproducible bulk preservation of pure, porous, methane hydrate at conditions 50 to 75 K above its equilibrium T (193 K) at 1 atm is refined. The amount of hydrate preserved by this method appears to be greatly in excess of that reported in the previous citations, and is likely the result of a mechanism different from ice shielding.
Ivan Baronak; Robert Trska
Broadband transfer mode ATM represent one of alternative solutions for growing requirements on transfer capabilities. Its advantage is an effort for provisions of guaranteed quality of transport services with preservations of high transfer rate. This property is covered by several mechanisms, which role is to control not only the traffic of existing connections, but also the admission of new ones and prevent the violation of requirements on transport quality of existing and new connections.
Nayegandhi, Amar; Yates, Xan; Brock, John C.; Sallenger, A.H.; Klipp, Emily S.; Wright, C. Wayne
These remotely sensed, geographically referenced elevation measurements of lidar-derived first-surface (FS) topography were produced collaboratively by the U.S. Geological Survey (USGS), Florida Integrated Science Center (FISC), St. Petersburg, FL, and the National Aeronautics and Space Administration (NASA), Wallops Flight Facility, VA. This project provides highly detailed and accurate datasets of the Mississippi coastline, from Lakeshore to Petit Bois Island, acquired September 9-10, 2001. The datasets are made available for use as a management tool to research scientists and natural-resource managers. An innovative scanning lidar instrument originally developed by NASA, and known as the Airborne Topographic Mapper (ATM), was used during data acquisition. The ATM system is a scanning lidar system that measures high-resolution topography of the land surface and incorporates a green-wavelength laser operating at pulse rates of 2 to 10 kilohertz. Measurements from the laser-ranging device are coupled with data acquired from inertial navigation system (INS) attitude sensors and differentially corrected global positioning system (GPS) receivers to measure topography of the surface at accuracies of +/-15 centimeters. The nominal ATM platform is a Twin Otter or P-3 Orion aircraft, but the instrument may be deployed on a range of light aircraft. Elevation measurements were collected over the survey area using the ATM system, and the resulting data were then processed using the Airborne Lidar Processing System (ALPS), a custom-built processing system developed in a NASA-USGS collaboration. ALPS supports the exploration and processing of lidar data in an interactive or batch mode. Modules for presurvey flight-line definition, flight-path plotting, lidar raster and waveform investigation, and digital camera image playback have been developed. Processing algorithms have been developed to extract the range to the first and last significant return within each waveform. ALPS
Nayegandhi, Amar; Yates, Xan; Brock, John C.; Sallenger, A.H.; Bonisteel, Jamie M.; Klipp, Emily S.; Wright, C. Wayne
These remotely sensed, geographically referenced elevation measurements of Lidar-derived first surface (FS) topography were produced collaboratively by the U.S. Geological Survey (USGS), Florida Integrated Science Center (FISC), St. Petersburg, FL, and the National Aeronautics and Space Administration (NASA), Wallops Flight Facility, VA. This project provides highly detailed and accurate datasets of the Alabama coastline, acquired October 3-4, 2001. The datasets are made available for use as a management tool to research scientists and natural resource managers. An innovative scanning Lidar instrument originally developed by NASA, and known as the Airborne Topographic Mapper (ATM), was used during data acquisition. The ATM system is a scanning Lidar system that measures high-resolution topography of the land surface, and incorporates a green-wavelength laser operating at pulse rates of 2 to 10 kilohertz. Measurements from the laser ranging device are coupled with data acquired from inertial navigation system (INS) attitude sensors and differentially corrected global positioning system (GPS) receivers to measure topography of the surface at accuracies of +/-15 centimeters. The nominal ATM platform is a Twin Otter or P-3 Orion aircraft, but the instrument may be deployed on a range of light aircraft. Elevation measurements were collected over the survey area using the ATM system, and the resulting data were then processed using the Airborne Lidar Processing System (ALPS), a custom-built processing system developed in a NASA-USGS collaboration. ALPS supports the exploration and processing of Lidar data in an interactive or batch mode. Modules for pre-survey flight line definition, flight path plotting, Lidar raster and waveform investigation, and digital camera image playback have been developed. Processing algorithms have been developed to extract the range to the first and last significant return within each waveform. ALPS is routinely used to create maps that
Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S
This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.
Full Text Available This paper provides an effective tool «fraud risk map« for organizations and auditors in mathematic assessment procedures, with real, tangible results, regarding the organization’s fraud risk exposure. Overcoming the fade and purely theoretical risk assessment methods («based on professional judgement – risk: high, medium, low«, the paper presents risk indicators as warning signals and quantitative and qualitative methods for risk assessment. Illustrating scalability methods and developping a practical tools for material misstatement of the economic entity financial statements, the case study presented, on sales operations, brigs added value to auditors work in the fraud risk assessment procedures.
Full Text Available Auditors have a key role in the formulation of an opinion on the effective functioning of management and control systems of the operational programs co-financed by ESIF. International Auditing Standards states that the primary responsibility for preventing and detecting fraud lies with both top management and those responsible for governance of the entity. On the other hand, the auditors also play a role in the fight against fraud and should help Member States fulfill their obligations to prevent, detect and correct irregularities and fraud.
Full Text Available This study aimed to examine a number of factors that affect the accounting fraud. This study used the variables consisting of information asymmetry, organizational commitment and individual morality. Theauthors study surveyed the employees at the Office for Management of Regional Revenue, Finance and Assets (Dinas Pendapatan Pengelolaan Keuangan Aset, Yogyakarta Province. This study uses convenience sampling technique method. The data from 96 respondents revealed that the variables of information asymmetry and organizational commitment significantly enhanced the accounting fraud while the individual morality significantly diminished the accounting fraud.
Rozmita Dewi Yuniarti Rozali
Full Text Available This study aims to determine the effect of implementation of risk based internal auditing on fraud prevention on internal audit Inspection Office Bank BRI Bandung Region. The sample used by 18 internal auditors in Inspection Office of Bank BRI Bandung Region saturated sampling method. Based on calculation of simple regression analysis obtained result that every increase of implementation of risk based internal auditing (X will lead to increase fraud prevention (Y. It shows that there is a positive influence between the implementation of risk based internal auditing on fraud prevention on the internal audit of Inspection Office of Bank BRI Bandung Region.
Yesuf, Ahmed; Wolos, Lars Peter; Rannenberg, Kai
Telecom providers are losing tremendous amounts of money due to fraud risks posed to Telecom services and products. Currently, they are mainly focusing on fraud detection approaches to reduce the impact of fraud risks against their services. However, fraud prevention approaches should also...... be investigated in order to further reduce fraud risks and improve the revenue of Telecom providers. Fraud risk modelling is a fraud prevention approach aims at identifying the potential fraud risks, estimating the damage and setting up preventive mechanisms before the fraud risks lead to actual losses....... In this paper, we highlight the important requirements for a usable and context-aware fraud risk modelling approach for Telecom services. To do so, we have conducted two workshops with experts from a Telecom provider and experts from multi-disciplinary areas. In order to show and document the requirements, we...
Full Text Available Affects the food control. The globalization, increased imports and exports and free trade agreements have led to greater sharing and access to food worldwide; along with it, the problems associated with fraud such as adulteration, substitution, intentionality, and counterfeiting have been increased. Therefore, there are various tasks associated with food fraud, which in most reviews published only new identification techniques have been discussed. However, a discussion about the types of fraud and its impact on society, bioterrorism and religion, has been little commented. This review focuses primarily on describing the types of fraud that has as objective to obtain economic benefit or cause terrorism. Also, latest techniques available for detecting meat adulteration are mentioned.
Gunduz, Murat; Önder, Oytun
The purpose of this paper is to develop an understanding about the internal fraud and corruption problem in the Turkish construction industry. The reasons behind the internal fraud and corruption problem as well as the types of prevention methods were investigated; and as a result various recommendations were made. To this end, a risk awareness questionnaire was used to understand the behavioral patterns of the construction industry, and to clarify possible proactive and reactive measures against internal fraud and corruption. The type of fraud experienced by Turkish construction companies was also surveyed in the questionnaire. The questionnaire was sent to 89 firms; and depending on the collected data, certain recommendations for construction industry professionals were provided.
M. C. Campagna
Full Text Available The present study reports a case of food fraud occurred in the Lazio region. Using the Isoelectrofocusing we revealed the substitution of tub-gurnard, with the less valuable commercial fish, pangasius.
Full Text Available This paper focuses on implementing Data Mining methods for card fraud detection. The approach to classification and prediction tasks for detection of unauthorized transactions is considered.
Gendered alternative to cyber fraud participation: an assessment of technological driven crime in Lagos State, Nigeria. Ajibade Ebenezer Jegede, Ayotunde Oluwadamilola Elegbeleye, Elizabeth Ibunkunoluwa Olowookere, Bankole Roberts Olorunyomi ...
Software agent Technology: A Framework for Minimizing Fraud in Postpaid Billing Systems. ... Journal of Research in National Development ... to the traditional Object-oriented Software engineering methodology was used to come up with this ...
To discuss the significance of "identity fraud"-a term that encompasses a broad range of illegal activities based on fraudulent use of identifying information of a real person or of a fictitious person...
Ivancic, William D.; Brooks, David E.; Frantz, Brian D.
A digitized video application was used to help determine minimum quality of service parameters for asynchronous transfer mode (ATM) over satellite. For these tests, binomially distributed and other errors were digitally inserted in an intermediate frequency link via a satellite modem and a commercial gaussian noise generator. In this paper, the relation- ship between the ATM cell error and cell loss parameter specifications is discussed with regard to this application. In addition, the video-encoding algorithms, test configurations, and results are presented in detail.
Albrecht, Chad; Holland, Daniel; Malagueño, Ricardo; Dolan, Simon; Tzafrir, Shay
In this paper, we investigate a large-scale financial statement fraud to better understand the process by which individuals are recruited to participate in financial statement fraud schemes. The case reveals that perpetrators often use power to recruit others to participate in fraudulent acts. To illustrate how power is used, we propose a model, based upon the classical French and Raven taxonomy of power, that explains how one individual influences another individual to participate in financi...
Bruno Carneiro da Rocha; Rafael Timóteo de Sousa Júnior
This article aims to evaluate the use of techniques of decision trees, in conjunction with the managementmodel CRISP-DM, to help in the prevention of bank fraud. This article offers a study on decision trees, animportant concept in the field of artificial intelligence. The study is focused on discussing how these treesare able to assist in the decision making process of identifying frauds by the analysis of informationregarding bank transactions. This information is captured with the use of t...
The results showed that the influence of professionalism of internal auditor to fraud prevention is 40.07%, and the rest of 59.93% can be influenced by other variables that are not examined. And the amount of influence of professionalism of internal auditors to the detection of fraud is 37.33%, the rest of 62.67% can be influenced by other variables that are not examined.
Mathieu Lefebvre; Pierre Pestieau; Arno Riedl; Marie Claire Villeval
En période de crise économique, les besoins de l’Etat augmentent et l’assiette fiscale se réduit ; il est alors courant de voir resurgir dans le débat public la lutte contre les diverses formes de fraude qui reduisent les recettes publiques. Dans ce contexte, on oppose régulièrement fraude fiscale à fraude sociale et la discussion porte souvent sur l’importance relative de l’une et de l’autre. On entend par fraude fiscale le détournement illégal d’un système fiscal afin de ne pas contribuer a...
Ayars, Michael; Eshleman, James; Goggins, Michael
Ataxia telangiectasia mutated (ATM) is inactivated in a significant minority of pancreatic ductal adenocarcinomas and may be predictor of treatment response. We determined if ATM deficiency renders pancreatic cancer cells more sensitive to fractionated radiation or commonly used chemotherapeutics. ATM expression was knocked down in three pancreatic cancer cell lines using ATM-targeting shRNA. Isogenic cell lines were tested for sensitivity to several chemotherapeutic agents and radiation. DNA repair kinetics were analyzed in irradiated cells using the comet assay. We find that while rendering pancreatic cancer cells ATM-deficient did not significantly change their sensitivity to several chemotherapeutics, it did render them exquisitely sensitized to radiation. Pancreatic cancer ATM status may help predict response to radiotherapy.
Graham, Mark E; Lavin, Martin F; Kozlov, Sergei V
ATM (ataxia-telangiectasia mutated) protein kinase is a key regulator of cellular responses to DNA damage and oxidative stress. DNA damage triggers complex cascade of signaling events leading to numerous posttranslational modification on multitude of proteins. Understanding the regulation of ATM kinase is therefore critical not only for understanding the human genetic disorder ataxia-telangiectasia and potential treatment strategies, but essential for deciphering physiological responses of cells to stress. These responses play an important role in carcinogenesis, neurodegeneration, and aging. We focus here on the identification of DNA damage inducible ATM phosphorylation sites to understand the importance of autophosphorylation in the mechanism of ATM kinase activation. We demonstrate the utility of using immunoprecipitated ATM in quantitative LC-MS/MS workflow with stable isotope dimethyl labeling of ATM peptides for identification of phosphorylation sites.
Huang, Dong-Sheng; Tao, Hou-Quan; He, Xu-Jun; Long, Ming; Yu, Sheng; Xia, Ying-Jie; Wei, Zhang; Xiong, Zikai; Jones, Sian; He, Yiping; Yan, Hai; Wang, Xiaoyue
Besides CDH1, few hereditary gastric cancer predisposition genes have been previously reported. In this study, we discovered two germline ATM mutations (p.Y1203fs and p.N1223S) in a Chinese family with a history of gastric cancer by screening 83 cancer susceptibility genes. Using a published exome sequencing dataset, we found deleterious germline mutations of ATM in 2.7% of 335 gastric cancer patients of different ethnic origins. The frequency of deleterious ATM mutations in gastric cancer patients is significantly higher than that in general population (p=0.0000435), suggesting an association of ATM mutations with gastric cancer predisposition. We also observed biallelic inactivation of ATM in tumors of two gastric cancer patients. Further evaluation of ATM mutations in hereditary gastric cancer will facilitate genetic testing and risk assessment.
Choi, E. K.; Ahn, S. D.; Rhee, Y. H.; Chung, H. S.; Ha, S. W; Song, C. W.; Griffin, R. J.; Park, H. J.
It has been known that ATM plays a central role in response of cells to ionizing radiation by enhancing DNA repair. We have investigated the feasibility of increasing radiosensitivity of tumor cells with the use of ATM inhibitors such as caffeine, pentoxifylline and wortmannin. Human colorectal cancer RKO.C cells and RKO-ATM cells (RKO cells overexpressing ATM) were used in the present study. The clonogenic cell survival in vitro indicated that RKO-ATM cells were markedly radioresistant than RKO.C cells. Treatment with 3 mM of caffeine significantly increased the radiosensitivity of cells, particulary the RKO-ATM cells, so that the radiosensitivity of RKO.C cells and RKO-ATM cells were almost similar. The radiation induced G2/M arrest in RKO-ATM cells was noticeably longer than that in RKO.C cells and caffeine treatment significantly reduced the length of the radiation induced G2/M arrest in both RKO.C and RKO-ATM cells. Pentoxifylline and wortmannin were also less effective than caffeine to radiosensitize RKO.C or RKO-ATM cells. However, wortmannin was more effective than caffeine against human lung adenocarcinoma A549 cells indicating the efficacy of ATM inhibitor to increase radiosensitivity is cell line dependent. For in vivo study, RKO.C cells were injected s.c. into the hind-leg of BALB/c-nuslc nude mice, and allowed to grow to 130mm3 tumor. The mice were i.p. injected with caffeine solution or saline and the tumors irradiated with 10 Gy of X-rays. The radiation induced growth delay was markedly increased by 1-2 mg/g of caffeine. It was concluded that caffeine increases radiosensitivity of tumor cells by inhibiting ATM kinase function, thereby inhibiting DNA repair, that occurs during the G2/M arrest after radiation
Yamauchi, Motohiro, E-mail: email@example.com [Graduate School of Biomedical Sciences, Nagasaki University, 1-12-4 Sakamoto, Nagasaki 852-8523 (Japan); Suzuki, Keiji; Oka, Yasuyoshi; Suzuki, Masatoshi; Kondo, Hisayoshi; Yamashita, Shunichi [Graduate School of Biomedical Sciences, Nagasaki University, 1-12-4 Sakamoto, Nagasaki 852-8523 (Japan)
Highlights: Black-Right-Pointing-Pointer We addressed how ATM suppresses frequency of chromosome translocation. Black-Right-Pointing-Pointer We found ATM/p53-dependent G1 checkpoint suppresses translocation frequency. Black-Right-Pointing-Pointer We found ATM and DNA-PKcs function in a common pathway to suppress translocation. -- Abstract: It is well documented that deficiency in ataxia telangiectasia mutated (ATM) protein leads to elevated frequency of chromosome translocation, however, it remains poorly understood how ATM suppresses translocation frequency. In the present study, we addressed the mechanism of ATM-dependent suppression of translocation frequency. To know frequency of translocation events in a whole genome at once, we performed centromere/telomere FISH and scored dicentric chromosomes, because dicentric and translocation occur with equal frequency and by identical mechanism. By centromere/telomere FISH analysis, we confirmed that chemical inhibition or RNAi-mediated knockdown of ATM causes 2 to 2.5-fold increase in dicentric frequency at first mitosis after 2 Gy of gamma-irradiation in G0/G1. The FISH analysis revealed that ATM/p53-dependent G1 checkpoint suppresses dicentric frequency, since RNAi-mediated knockdown of p53 elevated dicentric frequency by 1.5-fold. We found ATM also suppresses dicentric occurrence independently of its checkpoint role, as ATM inhibitor showed additional effect on dicentric frequency in the context of p53 depletion and Chk1/2 inactivation. Epistasis analysis using chemical inhibitors revealed that ATM kinase functions in the same pathway that requires kinase activity of DNA-dependent protein kinase catalytic subunit (DNA-PKcs) to suppress dicentric frequency. From the results in the present study, we conclude that ATM minimizes translocation frequency through its commitment to G1 checkpoint and DNA double-strand break repair pathway that requires kinase activity of DNA-PKcs.
Full Text Available The 2014 ‘Report to the Nations on Occupational Fraud and Abuse’ released by the Association of Certified Fraud Examiners estimates that the potential projected losses from occupational fraud globally could run as high as US$3.7 trillion every year. In Australia, several studies have found that the Australian public sector entities are also significantly exposed to fraud. This article considers the case of the Australian City of Joondalup and asks whether its management accounting function can provide city management with the necessary data to enable effective control over occupational fraud and whether fraud control activities specifically directed towards fraud control can be a regular feature thereof. It is concluded that although aspects of fraud control are encompassed within the broader strategies of the City, it can significantly enhance its ability to control occupational fraud by leveraging its regular management reporting and analysis function.
Resseguie, Emily A; Staversky, Rhonda J; Brookes, Paul S; O'Reilly, Michael A
High levels of oxygen (hyperoxia) are often used to treat individuals with respiratory distress, yet prolonged hyperoxia causes mitochondrial dysfunction and excessive reactive oxygen species (ROS) that can damage molecules such as DNA. Ataxia telangiectasia mutated (ATM) kinase is activated by nuclear DNA double strand breaks and delays hyperoxia-induced cell death through downstream targets p53 and p21. Evidence for its role in regulating mitochondrial function is emerging, yet it has not been determined if mitochondrial dysfunction or ROS activates ATM. Because ATM maintains mitochondrial homeostasis, we hypothesized that hyperoxia induces both mitochondrial dysfunction and ROS that activate ATM. In A549 lung epithelial cells, hyperoxia decreased mitochondrial respiratory reserve capacity at 12h and basal respiration by 48 h. ROS were significantly increased at 24h, yet mitochondrial DNA double strand breaks were not detected. ATM was not required for activating p53 when mitochondrial respiration was inhibited by chronic exposure to antimycin A. Also, ATM was not further activated by mitochondrial ROS, which were enhanced by depleting manganese superoxide dismutase (SOD2). In contrast, ATM dampened the accumulation of mitochondrial ROS during exposure to hyperoxia. Our findings suggest that hyperoxia-induced mitochondrial dysfunction and ROS do not activate ATM. ATM more likely carries out its canonical response to nuclear DNA damage and may function to attenuate mitochondrial ROS that contribute to oxygen toxicity. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.
Ortega-Atienza, Sara; Wong, Victor C.; DeLoughery, Zachary; Luczak, Michal W.; Zhitkovich, Anatoly
Many carcinogens damage both DNA and protein constituents of chromatin, and it is unclear how cells respond to this compound injury. We examined activation of the main DNA damage-responsive kinase ATM and formation of DNA double-strand breaks (DSB) by formaldehyde (FA) that forms histone adducts and replication-blocking DNA-protein crosslinks (DPC). We found that low FA doses caused a strong and rapid activation of ATM signaling in human cells, which was ATR-independent and restricted to S-phase. High FA doses inactivated ATM via its covalent dimerization and formation of larger crosslinks. FA-induced ATM signaling showed higher CHK2 phosphorylation but much lower phospho-KAP1 relative to DSB inducers. Replication blockage by DPC did not produce damaged forks or detectable amounts of DSB during the main wave of ATM activation, which did not require MRE11. Chromatin-monitoring KAT5 (Tip60) acetyltransferase was responsible for acetylation and activation of ATM by FA. KAT5 and ATM were equally important for triggering of intra-S-phase checkpoint and ATM signaling promoted recovery of normal human cells after low-dose FA. Our results revealed a major role of the KAT5-ATM axis in protection of replicating chromatin against damage by the endogenous carcinogen FA. PMID:26420831
Takagi, Masatoshi; Nakata, Shinichiro; Mizutani, Shuki
Ataxia-Telangiectasia (A-T) is an autosomal recessive inherited disease due to mutation of ATM gene on chromosome 11q22.3, with major symptoms of ataxia, telangiectasia, immunodeficiency and frequent complication of cancer, and the cells have characters of chromosomal break, high sensitivity to radiation and inappropriate continuation of DNA synthesis after radiation. This review describes past and present studies of ATM functions with clinical features in the following order: Clinical symptoms and epidemiology; ATM gene mutation in A-T patients, mainly by frame-shift (80-90%); ATM, whose gene consisted from 66 exons (150 kb), functions in phosphoinositide-3-kinase related kinase family which protecting cells from stress and integrating their system, at response to DNA double strand break, and in the cell cycle checkpoints at G1/S, S and G2/M phases; ATM nonsense/missense mutations in embryonic cells leading to carcinogenesis and role of ATM in the suppression of carcinogenesis in somatic cells; Chromosomal translocation which relating to carcinogenesis, by functional defect of ATM; and Other functions of ATM in neuronal growth, immunodeficiency, carbohydrate and lipid metabolism, early senescence, and virus infection. ATM is thus an essential molecule to maintain growth and homeostasis. (T.I.)
Full Text Available This study examines accounting fraud in relation to the characteristics of company executives. The study portrays the degree to which company as well as personal motives could urge an executive to commit fraud. Subsequently, we attempt to identify the degree to which certain socio-economic factors and the existence of strong internal audit mechanisms act as deterrence agents. Furthermore, we investigate the personal financial gain in relation to annual income as a motivator to commit fraud. Finally, we examine the optimal imprisonment duration as a deterrent and the overall probability to commit fraud. The research method was based in the distribution of a questionnaire and took place in the city of Thessaloniki and the region of West Macedonia and Thessaly. The participants were executives in the banking, financial and insurance sector. Our findings show that it is mostly personal factors that motivate an executive to commit fraud, but the fear of immediate legal sanctions and the existence of strong internal audit mechanisms are effective deterrence agents.
Full Text Available Background: Fraud attempts create large losses for financing subjects in modern economies. At the same time, leasing agreements have become more and more popular as a means of financing objects such as machinery and vehicles, but are more vulnerable to fraud attempts. Objectives: The goal of the paper is to estimate the usability of the data mining approach in discovering fraud in leasing agreements. Methods/Approach: Real-world data from one Croatian leasing firm was used for creating tow models for fraud detection in leasing. The decision tree method was used for creating a classification model, and the CHAID algorithm was deployed. Results: The decision tree model has indicated that the object of the leasing agreement had the strongest impact on the probability of fraud. Conclusions: In order to enhance the probability of the developed model, it would be necessary to develop software that would enable automated, quick and transparent retrieval of data from the system, processing according to the rules and displaying the results in multiple categories.
Tri Ramaraya Koroy
Full Text Available Objectives of this paper are to identify and describe the problems in detecting the financial statement fraud in auditing financial statements by external auditors. Although detection of fraud is important to enhance the value of auditing, there are many problems that impede the appropriate implementation of detection. Based on review of related research that have bee done, there are four factors that identified in this paper. First, the characteristic of fraud occurence made it difficult for detection process. Second, auditing standards is not sufficiently supporst the proper detection. Third, work environment of audit may reduce the quality and the last, audit methods and procedures are not enough for efective detection. Based on this identified problems, the improvement of implementation was suggested. Abstract in Bahasa Indonesia: Tujuan makalah ini adalah mengidentifikasi dan menguraikan permasalahan dalam pendeteksian kecurangan dalam audit atas laporan keuangan oleh auditor eksternal. Meskipun pendeteksian kecurangan penting untuk meningkatkan nilai pengauditan, namun terdapat banyak masalah yang dapat menghalangi implementasi dari pendeteksian yang tepat. Berdasarkan telaah atas berbagai penelitian yang telah dilakukan, ada terdapat empat faktor penyebab besar yang diidentifikasikan melalui makalah ini. Pertama, karakteristik terjadinya kecurangan sehingga menyulitkan proses pendeteksian. Kedua, standar pengauditan belum cukup memadai untuk menunjang pendeteksian yang sepantasnya. Ketiga, lingkungan kerja audit dapat mengurangi kualitas audit dan keempat metode dan prosedur audit yang ada tidak cukup efektif untuk melakukan pendeteksian kecurangan. Berdasarkan permasalahan ini, perbaikan yang perlu disarankan untuk diterapkan. Kata kunci: auditing, fraud, financial statement fraud
Learn, Larry L., Ed.
Discusses current LAN (local area network) configuration and explains ATM (asynchronous transfer mode) as the future telecommunications transport. Highlights include LAN emulation, which enables the interconnection of legacy LANs and the new ATM environment; virtual LANs; broadcast servers; and standards. (LRW)
Waveren, C.J. van; Luiijf, H.A.M.; Burakowski, W.; Kopertowski, Z.
The next generation of tactical networks will be based on the ATM technology. The POST-2000 tactical network is just in the designing phase. The objective of this paper is to point out the main problems which should be solved to adopt ATM technology into the tactical network environment. The
This is going to be achieved by creating another input device that collects the money into the ATM system, reads its denomination and either saves it or transfers it the required customer ... Keywords: Automated Teller Machine (ATM), Interswitch, Local Area Network (LAN), Wide Area Network (WAN), Telecommunication.
ATM (Asynchronous Transfer Mode) network technology handles the real-time continuous traffic flow necessary to support desktop multimedia applications. Describes network applications already used: desktop video collaboration, distance learning, and broadcasting video delivery. Examines the architecture of ATM technology, video delivery and sound…
Yao, Engui; Perry, John F.; Anderson, Larry S.; Brook, R. Dan; Hare, R. Dwight; Moore, Arnold J.; Xu, Xiaohe
This study examined the relationships between ATM (asynchronous transfer mode) adoption in universities and four organizational variables: university size, type, finances, and information processing maturity. Another purpose of the study was to identify the current status of ATM adoption in campus networking. Subjects were university domain LAN…
Bernstein, Jonine L; Concannon, Patrick
It was first suggested more than 40 years ago that heterozygous carriers for the human autosomal recessive disorder Ataxia-Telangiectasia (A-T) might also be at increased risk for cancer. Subsequent studies have identified the responsible gene, Ataxia-Telangiectasia Mutated (ATM), characterized genetic variation at this locus in A-T and a variety of different cancers, and described the functions of the ATM protein with regard to cellular DNA damage responses. However, an overall model of how ATM contributes to cancer risk, and in particular, the role of DNA damage in this process, remains lacking. This review considers these questions in the context of contralateral breast cancer (CBC). Heterozygous carriers of loss of function mutations in ATM that are A-T causing, are at increased risk of breast cancer. However, examination of a range of genetic variants, both rare and common, across multiple cancers, suggests that ATM may have additional effects on cancer risk that are allele-dependent. In the case of CBC, selected common alleles at ATM are associated with a reduced incidence of CBC, while other rare and predicted deleterious variants may act jointly with radiation exposure to increase risk. Further studies that characterize germline and somatic ATM mutations in breast cancer and relate the detected genetic changes to functional outcomes, particularly with regard to radiation responses, are needed to gain a complete picture of the complex relationship between ATM, radiation and breast cancer.
Blaabjerg, Søren; Gravey, A.; Romæuf, L.
essential to set traffic characteristic values that are relevant to the considered cell stream, and that ensure that the amount of non-conforming traffic is small. Using a queueing model representation for the GCRA formalism, several methods are available for choosing the traffic characteristics. This paper......In ATM networks, a user should negotiate at connection set-up a traffic contract which includes traffic characteristics and requested QoS. The traffic characteristics currently considered are the Peak Cell Rate, the Sustainable Cell Rate, the Intrinsic Burst Tolerance and the Cell Delay Variation...... (CDV) tolerance(s). The values taken by these traffic parameters characterize the so-called ''Worst Case Traffic'' that is used by CAC procedures for accepting a new connection and allocating resources to it. Conformance to the negotiated traffic characteristics is defined, at the ingress User...
Singh, B. K.; Adkisson, W. B.
The paper discusses the methods used for the calculation of ATM solar array performance characteristics and provides the parametric analysis of solar panels used in SKYLAB. To predict the solar array performance under conditions other than test conditions, a mathematical model has been developed. Four computer programs have been used to convert the solar simulator test data to the parametric curves. The first performs module summations, the second determines average solar cell characteristics which will cause a mathematical model to generate a curve matching the test data, the third is a polynomial fit program which determines the polynomial equations for the solar cell characteristics versus temperature, and the fourth program uses the polynomial coefficients generated by the polynomial curve fit program to generate the parametric data.
Song, C. W.; Griffin, R. J.; Park, H. J.; Chung, H. S.; Choi, E. K.; Ahn, S. D.; Rhee, Y. H.; Ha, S. W.
It has been known that ATM plays a central role in response of cells to ionizing radiation by enhancing DNA repair. Based in large part on studies of the homologous proteins in yeast, it is predicted that ATM function as proximal signal transducers in G1, S, and G2 checkpoint pathways. With the exception of p53, the downstream components of these pathways remain largely undefined. We have investigated the feasibility of increasing radiosensitivity of tumor cells with the use of ATM inhibitors such as caffeine, pentoxifylline, and wortmannin. Also in an effort to examine and understand the molecular mechanism by which ATM might exert its cellular effects, we have expressed the full length wild type ATM in RKO cells
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
...) is using new and innovative techniques for fraud detection. Their primary techniques for fraud detection are the data mining tools of classification trees and neural networks as well as methods for pooling the results of multiple model fits...
... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...
Madan Lal Bhasin
Full Text Available Banks are the engines that drive the operations in the financial sector, money markets and growth of an economy. With the rapidly growing banking industry in India, frauds in banks are also increasing fast, and fraudsters have started using innovative methods. A questionnaire-based survey was conducted in 2013-14 among 345 bank employees to know their perception towards bank frauds, degree of their compliance level, and integration of technology to detect, control and prevent frauds. This study provides discussion of the attitudes, strategies, and the technology that bank specialists will need to combat frauds. Banks that can leverage advances in technology and analytics to improve fraud prevention will reduce their fraud losses. In 2015, the RBI introduced new mechanisms for banks to check loan frauds by taking pro-active steps by setting up a Central Fraud Registry, introduced the concept of Red Flagged Account, and Indian investigative agencies will soon start sharing their databases with banks.
Full Text Available In the current economical situation, fraud cannot be regarded as an exception with random occurrence and limited effects on credit institution. Major fraud scandals that shook the financial markets required a rethinking of the organization and control of the banks to keep intact the trust of customers. Identifying and assessing risks is a concern not only for managers, but also for internal and external auditors. Management may implement programs or measures to limit the risks or deciding to accept some risks. In order to identify the main causes generating fraud risk and increasing the quality of banking activity we used a quantitative research method that was based on a questionnaire administered individually, using SPSS.
Stefani Lily Indarto
Full Text Available The accounting scandal became one of the reasons for analyzing financial statements in order to minimize fraud against the financial reporting. Therefore, companies use the services of a public accountant to audit the financial statements of companies that are expected to limit the fraudulent practices that increase the public’s confidence in the company’s financial statements. This study aims to detect fraud by using analysis of fraud diamond . This study takes banking companies listed on the Indonesian Stock Exchange in 2009-2014, with a total sample of 149 banks. Based on the results the external pressure, financial stability and capability have influence on fraudulent financial reporting. While target financial, ineffective monitoring and rationalization does not affect the fraudulent financial reporting
In the framework of CERN’s anti-fraud policy and in accordance with Operational Circular No. 10, entitled “Principles and procedures governing investigation of fraud”, published in January 2013, a number of fraudulent activities involving several members of the personnel, suppliers and contractors’ staff were investigated by the Internal Audit Service between April and August 2013. In August 2013, the facts established by the Internal Audit Service were reported to the Director-General, who decided to pursue disciplinary action, for which the Joint Advisory Disciplinary Board (JADB) was consulted. The JADB heard all impugned members of the personnel, thoroughly examined each individual case, analysed the findings and made recommendations to the Director-General in March 2014. It found, in particular, conflicts of interest and fraudulent activities in violation of CERN's Procurement Rules. Sanctions were recommended by the JADB in all cases, rangi...
Chunitska Iryna I.
Full Text Available The problems of preventing financial fraud and legalization of funds using mechanisms of the financial market are considered. The relevance of this problem in general and peculiar features of its research in developing economies are substantiated. The experience of organizations created to prevent the legalization of illicit funds is studied. It is determined that new organizations are created in response to the global challenges. It is justified that in Ukraine the fight against the legalization of illicit funds has actualized due to a lack of financial resources in the country, declaration of course towards European values and also as a result of the military conflict in the east of the country. The risk factors for financial fraud and illegal movement of financial flows are systematized according to the groups of conditions: pressure, favorable situation, propensity (justification. It is determined which levels of risk of generating illegal financial flows are inherent in different sectors of the economy depending on institutional factors. It is argued that the increase in the risks of illegal financial flows occurs under conditions of a low level of maturity of the institutional environment and a high level of information asymmetry. Types and tools of fraud in the financial market that increase the risks of illegal financial flows are systematized. It is determined that main types of fraud in the financial market are related to information manipulations and regulatory deficiencies. The world experience of legislative initiatives on counteracting the legalization of funds in financial markets is systematized. It is justified that, in order to prevent financial fraud and prevent legalization of illicit funds in Ukraine, it is necessary to ensure maximum transparency of information on the movement of financial flows in financial markets. In addition, regulators of the financial market should not only cooperate with each other but also prevent
Zamzami, Faiz; Nusa, Nabella Duta; Timur, Rudi Prasetya
Some cases of corruption have taken place in several universities in Indonesia. To prevent and handle the cases, internal auditors play pivotal roles in detecting and preventing fraud. Therefore, effective methods to detect and prevent fraud are needed. The methods are expected to set the appropriate measures to detect and prevent fraud effectively. This research proposed a question how the internal auditors perceive the effectiveness of fraud detection and prevention methods. The research ai...
Full Text Available Tujuan penelitian ini adalah untuk menggali persepsi pegawai di instansi pemerintahan mengenai faktor-faktor yang mempengaruhi fraud. Faktor-faktor tersebut antara lain sistem pengendalian internal, asimetri informasi, keadilan distributif, keadilan prosedural, kultur organisasi, penegakan hukum dan moralitas individu.Populasi dalam penelitian ini adalah Pegawai Negeri Sipil (PNS yang bekerja pada bagian keuangan di SKPD Kabupaten Temanggung sebanyak 95 responden. Metode pengumpulan data yang dilakukan dengan menggunakan metode kuesioner dengan skala likert 1-5. Penelitian ini menggunakan alat analisis data regresi berganda.Hasil penelitian menunjukkan bahwa terdapat pengaruh negatif sistem pengendalian internal terhadap fraud, terdapat pengaruh positif asimetri informasi terhadap fraud, tidak terdapat pengaruh keadilan distributif terhadap fraud, tidak terdapat pengaruh keadilan prosedural terhadap fraud, tidak terdapat pengaruh kultur organisasi terhadap fraud, tidak terdapat pengaruh penegakan hukum terhadap fraud, terdapat pengaruh negatif moralitas individu terhadap fraud. The purpose of this study was to explore the perceptions of employees in government agencies about the factors that influence fraud. These factors include the internal control system, the asymmetry of information, distributive justice, procedural justice, organizational culture, law enforcement and individual morality. The population in this study is were employees of SKPD in Temanggung Regencyas many as 95 respondents. Methods of data collection is done by using questionnaires with Likert scale 1-5. This study uses multiple regression data analysis tools. The results showed that there was a negative effect of the internal control system against fraud, there is a positive effect of information asymmetry against fraud, there is no influence of distributive justice against fraud, there is no influence procedural justice against fraud, there is no influence of organizational
The topic of this thesis is fraud detection in mobile communications networks by means of user profiling and classification techniques. The goal is to first identify relevant user groups based on call data and then to assign a user to a relevant group. Fraud may be defined as a dishonest or illegal use of services, with the intention to avoid service charges. Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. Whereas the int...
Responsibility for preventing and detecting fraud rest with management entities. Although the auditor is not and cannot be held responsible for preventing fraud and errors, in your work, he can have a positive role in preventing fraud and errors by deterring their occurrence. The auditor should plan and perform the audit with an attitude of professional skepticism, recognizing that condition or events may be found that indicate that fraud or error may exist. Based on the audit risk asse...
Full Text Available This article discussed a method that can be done by a company to minimize fraud action by applying Control Self Assessment (CSA. The study was conducted by studying literature on the topics discussed that were presented descriptively in a systematic manner through the review one by one from the initial problem to solve the problem. It can be concluded that CSA is one form of auditing practices that emphasizes anticipatory action (preventive of the act of detection (detective that the concept of modern internal audit which is carried more precise in application. It is one alternative that is most efficient and effective in reducing fraud.
Fraud and corruption are strongly connected in the private sector and the level of corruption in the last few years remains very high, despite the efforts of governments to reduce it. It is well known that local and multinational companies are paying bribes in order to win public contracts or benefits. The level of fraud became very high during the economic crunch, due to the globalization and expansion of computer systems. All the data is on-line on the computer systems and has became very vulnerable. Thus, the governments are becoming more interested in securing the computer information and financial data.
Andrean Hutama Koosasi
Full Text Available Model Markov Tersembunyi merupakan sebuah metode statistik berdasarkan Model Markov sederhana yang memodelkan sistem serta membaginya dalam 2 (dua state, state tersembunyi dan state observasi. Dalam pengerjaan tugas akhir ini, penulis mengusulkan penggunaan metode Model Markov Tersembunyi untuk menemukan fraud didalam sebuah pelaksanaan proses bisnis. Dengan penggunaan metode Model Markov Tersembunyi ini, maka pengamatan terhadap elemen penyusun sebuah kasus/kejadian, yakni beberapa aktivitas, akan diperoleh sebuah nilai peluang, yang sekaligus memberikan prediksi terhadap kasus/kejadian tersebut, sebuah fraud atau tidak. Hasil ekpserimen ini menunjukkan bahwa metode yang diusulkan mampu memberikan prediksi akhir dengan evaluasi TPR sebesar 87,5% dan TNR sebesar 99,4%.
... 32 National Defense 3 2010-07-01 2010-07-01 true Overseas cases of fraud or corruption. 516.67... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas cases of fraud or corruption. (a) Commanders of overseas major commands will establish procedures...
Prompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that…
... part on conduct in violation of the antitrust laws or to any debt involving fraud, the presentation of... whole or in part on conduct in violation of the antitrust laws or any claim involving fraud, the... 10 Energy 4 2010-01-01 2010-01-01 false Antitrust, fraud, tax, interagency, transportation account...
... of the antitrust laws or to any debt involving fraud, the presentation of a false claim, or... whole or in part on conduct in violation of the antitrust laws or any claim involving fraud, the... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Antitrust, fraud, and tax...
van Keulen, Maurice
Governmental organizations responsible for keeping certain types of fraud under control, often use data-driven methods for both immediate detection of fraud, or for fraud risk analysis aimed at more effectively targeting inspections. A blind spot in such methods, is that the source data often
... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...
... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...
... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...
... 3235-AK77 Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based... fraud, manipulation, and deception in connection with the offer, purchase or sale of any security-based... measured and reasonable means to prevent fraud, manipulation, and deception in connection with security...
payloads and instead began distributing Bitcoin miners and click fraud modules.3 From a technical perspective, the primary click fraud malware used in...this era operated in the indiscriminate “auto-clicking” fashion we describe in Section 5. Alongside the click fraud and Bitcoin payloads, ZeroAccess
Full Text Available Abstrak: Model Pendeteksian Kecurangan Laporan Keuangan dengan Analisis Fraud Triangle. Penelitian ini bertujuan untuk membuat model dalam mendeteksi kecurangan laporan keuangan. Penelitian ini menguji variabel fraud triangle dan auditor spesialis industri dengan kecurangan laporan keuangan. Sampel penelitian adalah 30 perusahaan fraud dan 30 perusahaan non-fraudyang listing di Bursa Efek Indonesia (BEI serta terkena sanksi dan kasus oleh Otoritas Jasa Keuangan (OJK. Hasil penelitian ini menunjukkan financial targetsdapat mendeteksi kecurangan laporan keuangan, sedangkan financial stabililty tidak dapat mendeteksi kecurangan laporan keuangan. Abstract: Financial Statement Fraud Detection Model with Fraud Triangle Analysis. The research purposes is to create a model to detect financial statement fraud. This research examines the variable of fraud triangle and auditor industry specialization with financial statement fraud. Samples were 30 companies of fraud and 30 non-fraud companies that were listed on the Indonesia Stock Exchange (IDX and sanctioned by the Financial Services Authority (FSA. The result shows the financial targets can be detect financial statement fraud, while financial stability can’t be detect financial statement fraud.
... 42 Public Health 4 2010-10-01 2010-10-01 false Cooperation with State Medicaid fraud control units... Detection and Investigation Program § 455.21 Cooperation with State Medicaid fraud control units. In a State with a Medicaid fraud control unit established and certified under subpart C of this part, (a) The...
The multiprotocol over ATM (MPOA), specified by the ATM Forum, provides an architecture for transfer of Internetwork layer packets (Layer 3 datagram such as IP, IPX) over ATM subnets or across the emulated LANs. MPOA provides shortcuts that bypass routers to avoid router bottlenecks. It is a grand union of some of the existing standards such as LANE by the ATM Forum, NHRP by the IETF, and the Q.2931 by ITU. The intent of this paper is to clarify the data flows between pairs of source and destination hosts in an MPOA system. It includes scenarios for both the intra- and inter-subnet flows between different pairs of MPOA end-systems. The intrasubnet flows simply use LANE for address resolution or data transfer. The inter-subnet flows may use a default path for short-lived flows or a shortcut for long-lived flows. The default path uses the LANE and router capabilities. The shortcut path uses LANE plus NHRP for ATM address resoluton. An ATM virtual circuit is established before the data transfer. This allows efficient transfer of internetwork layer packets over ATM for real-time applications.
Wang, Xuejuan; Chu, Huanyu; Lv, Mengjuan; Zhang, Zhihui; Qiu, Shuwan; Liu, Haiyan; Shen, Xuetong; Wang, Weiwu; Cai, Gang
The ataxia-telangiectasia mutated (ATM) protein is an apical kinase that orchestrates the multifaceted DNA-damage response. Normally, ATM kinase is in an inactive, homodimer form and is transformed into monomers upon activation. Besides a conserved kinase domain at the C terminus, ATM contains three other structural modules, referred to as FAT, FATC and N-terminal helical solenoid. Here we report the first cryo-EM structure of ATM kinase, which is an intact homodimeric ATM/Tel1 from Schizosaccharomyces pombe. We show that two monomers directly contact head-to-head through the FAT and kinase domains. The tandem N-terminal helical solenoid tightly packs against the FAT and kinase domains. The structure suggests that ATM/Tel1 dimer interface and the consecutive HEAT repeats inhibit the binding of kinase substrates and regulators by steric hindrance. Our study provides a structural framework for understanding the mechanisms of ATM/Tel1 regulation as well as the development of new therapeutic agents.
Roy, Kanaklata; Wang, Lilin; Makrigiorgos, G. Mike; Price, Brendan D.
Glioblastomas are among the malignancies most resistant to radiation therapy. In contrast, cells lacking the ATM protein are highly sensitive to ionizing radiation. The relationship between ATM protein expression and radiosensitivity in 3 glioma cell lines was examined. T98G cells exhibited normal levels of ATM protein, whereas U118 and U87 cells had significantly lower levels of ATM and increased (>2-fold) sensitivity to ionizing radiation compared to T98G cells. The ATM promoter was methylated in U87 cells. Demethylation by azacytidine treatment increased ATM protein levels in the U87 cells and decreased their radiosensitivity. In contrast, the ATM promoter in U118 cells was not methylated. Further, expression of exogenous ATM did not significantly alter the radiosensitivity of U118 cells. ATM expression is therefore heterogeneous in the glioma cells examined. In conclusion, methylation of the ATM promoter may account for the variable radiosensitivity and heterogeneous ATM expression in a fraction of glioma cells
The Electronic Navigation Research Institute (ENRI) held its third International Workshop on ATM / CNS in 2013 with the theme of "Drafting the future sky". There is worldwide activity taking place in the research and development of modern air traffic management (ATM) and its enabling technologies in Communication, Navigation and Surveillance (CNS). Pioneering work is necessary to contribute to the global harmonization of air traffic management and control. At this workshop, leading experts in research, industry and academia from around the world met to share their ideas and approaches on ATM/CNS related topics.
Leemput, Julia; Masson, Christel; Bigot, Karine; Errachid, Abdelmounaim; Dansault, Anouk; Provost, Alexandra; Gadin, Stéphanie; Aoufouchi, Said; Menasche, Maurice; Abitbol, Marc
High levels of metabolism and oxygen consumption in most adult murine ocular compartments, combined with exposure to light and ultraviolet (UV) radiation, are major sources of oxidative stress, causing DNA damage in ocular cells. Of all mammalian body cells, photoreceptor cells consume the largest amount of oxygen and generate the highest levels of oxidative damage. The accumulation of such damage throughout life is a major factor of aging tissues. Several multiprotein complexes have recently been identified as the major sensors and mediators involved in the maintenance of DNA integrity. The activity of these complexes initially seemed to be restricted to dividing cells, given their ultimate role in major cell cycle checkpoints. However, it was later established that they are also active in post-mitotic cells. Recent findings demonstrate that the DNA damage response (DDR) is essential for the development, maintenance, and normal functioning of the adult central nervous system. One major molecular factor in the DDR is the protein, ataxia telangiectasia mutated (ATM). It is required for the rapid induction of cellular responses to DNA double-strand breaks. These cytotoxic DNA lesions may be caused by oxidative damage. To understand how ATM prevents oxidative stress and participates in the maintenance of genomic integrity and cell viability of the adult retina, we determined the ATM expression patterns and studied its localization in the adult mouse eye. Atm gene expression was analyzed by RT-PCR experiments and its localization by in situ hybridization on adult mouse ocular and cerebellar tissue sections. ATM protein expression was determined by western blot analysis of proteins homogenates extracted from several mouse tissues and its localization by immunohistochemistry experiments performed on adult mouse ocular and cerebellar tissue sections. In addition, subcellular localization was realized by confocal microscopy imaging of ocular tissue sections, with a special
...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... and analyzing State Medicaid claims data, known as data mining. To support and modernize MFCU efforts... (FFP) in the costs of defined data mining activities under specified conditions. In addition, we...
Aronowitz, A.A.; Laagland, D.C.G.; Paulides, G.
Questions addressed in this project included:What are the existing control mechanisms and how do they operate? What public bodies are responsible for the fight against Value Added Tax (VAT) fraud and what are their competencies? What are the possibilities to exchange information between member
This study explored patterns of fraud and abuse that exist in the National Health Insurance Scheme (NHIS) claims in the Awutu-Effutu-Senya District using data mining techniques, with a specific focus on malaria-related claims. The study employed quantitative research approach with survey design as a strategy of enquiry.
... pursue Medicaid provider fraud, we finalize proposals to permit Federal financial participation (FFP) in... general approach to data mining by MFCUs is to give each MFCU the autonomy to choose how to operate its...) to read as follows: Sec. 1007.19 Federal financial participation (FFP). * * * * * (e) * * * (2...
This understanding gave birth to the Hierarchical Temporal Memory (HTM) which holds a lot of promises in the area of time-series prediction and anomaly detection problems. This paper demonstrates the behaviour of an HTM model with respect to its learning and prediction of online credit card fraud. The model was ...
Okrzesik, Daryl J.; Nuehring, Bert G.
Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…
Tesliuc, Emil Daniel; Milazzo, Annamaria
Social Protection (SP) and Social Safety Net (SSN) programs channel a large amount of public resources, it is important to make sure that these reach the intended beneficiaries. Error, fraud, or corruption (EFC) reduces the economic efficiency of these interventions by decreasing the amount of money that goes to the intended beneficiaries, and erodes the political support for the program. ...
work fraud dynamics by network administrators and stakeholders. In considering ... cyber crime within the last two years. How- ever, two-thirds of the ... ˆ increased exposure to unpredictable fi- nancial losses ... The intentions of the customers are reflected ..... 'There is a 95% confidence that the differ- ence between the ...
David Bordelon identifies himself as one of the majority of Americans who voted to keep Trump out of office. In this article he discusses his confusion by the Tea Party's fixation on welfare fraud, and inability to recognize it in President Trump's behavior. The author says that he can only hope that his confusion will be shared, and progress to…
In considering the implications of the varied nature of the potential targets, the paper identifies the view to develop effective intelligence analysis methodologies for network fraud detection and prevention by network administrators and stakeholders. The paper further notes that organizations are fighting an increasingly ...
The law requires that plaintiffs in fraud cases be 'justified' in relying on a misrepresentation. I deploy the accumulated intuitions of the law to defend externalist accounts of epistemic justification and knowledge against Laurence BonJour's counterexamples involving clairvoyance. I suggest that the law can offer a ...
If someone used check as a tool to fraud and looting of property of others, should they just be subject to check law, and according to the provisions of the law are prosecuted? Are crook people the same as honorable merchants that due to some unwanted changes and fluctuations in the market and social conditions
Full Text Available In our paper we shall try to present two mechanisms of fiscal fraud used by economical agents and also found in the control actions performed by the fiscal organs at different commercial societies from Romania. The presented mechanisms refer to the fiscal fraud resulted from fictitious acquisitions of goods and services done by Romanian firms which have as beneficiaries other commercial societies which are fiscally registered in Romania. Being empirically examined, the fiscal fraud will be presented through the use of some figures which will describe the detailed operations step by step.For the cases we have chosen to present we will describe the real circuit of goods and money according to the documents. We will also refer to the possibility of identifying the risk of fiscal fraud that results from the reports provided by the economic agents for different state institutions. We will also consider the information provide by the books of prime entry and bookkeeping, documents which have to be written by the commercial societies according to the Law accountancy nr. 82/199, with further modifications and completions. The mechanisms of fiscal fraud in use can be identical with the ones presented in this paper or they can be different as „new elements” can appear; these „new elements” depend on the type of activity performed, the modifications the legislative framework, the performers’ creativity or other external or internal factors which are not identified by the fiscal organs. By identifying the fiscal fraud mechanisms and the way in which they function, the fiscal organs will be given the opportunity to take the necessary measures so that the fiscal resources of the state consolidated budget should not be affected by such operations. It is will known that we can speak of fiscal fraud and shadow economy in any country but ,according to the reports and statistics published by different international institutions, Romania’s shadow
The overall objective of this project is to develop a prototype virtual machine that fits on current Advanced Traffic Management Systems (ATMS) controllers and provides functionality for complex traffic operations.;Prepared in cooperation with Utah S...
Adams, Phillip; Clark, Jonathan; Hawdon, Simon; Hill, Jennifer; Plater, Andrew
Ataxia telangiectasia mutated (ATM) is a serine/threonine kinase that plays a key role in the regulation of DNA damage pathways and checkpoint arrest. In recent years, there has been growing interest in ATM as a therapeutic target due to its association with cancer cell survival following genotoxic stress such as radio- and chemotherapy. Large-scale targeted drug screening campaigns have been hampered, however, by technical issues associated with the production of sufficient quantities of purified ATM and the availability of a suitable high-throughput assay. Using a purified, functionally active recombinant ATM and one of its physiological substrates, p53, we have developed an in vitro FRET-based activity assay that is suitable for high-throughput drug screening.
Full Text Available Bankers and other financial experts have analyzed the value of automated teller machines (ATM in terms of growing consumer demand, rising costs of technology development, decreasing profitability and market share. This paper presents a step-by-step cost-benefit analysis of the ATM automatic deposit service. The first step is to determine user attitudes towards using ATM automatic deposit service by using the Technology Acceptance Model (TAM. The second step is to determine location priorities for ATMs that provide automatic deposit services using the Analytic Hierarchy Process (AHP model. The results of the previous steps enable a highly efficient application of cost-benefit analysis for evaluating costs and benefits of automatic deposit services. To understand fully the proposed procedure outside of theoretical terms, a real-world application of a case study is conducted.
The Automated Transportation Management System (ATMS) Software User Guide (SUG) constitutes the user procedures for the ATMS System. Information in this document will be used by the user to operate the automated system. It is intended to be used as a reference manual to guide and direct the user(s) through the ATMS software product and its environment. The objectives of ATMS are as follows: to better support the Procurement function with freight rate information; to free Transportation Logistics personnel from routine activities such as the auditing and input of freight billing information; to comply with Headquarters Department of Energy-Inspector General (DOE-IG) audit findings to automate transportation management functions; to reduce the keying of data into the Shipment Mobility Accountability Collection (SMAC) database; and to provide automation for the preparing of Bill of Lading, Declaration of Dangerous Goods, Emergency Response Guide and shipping Labels using HM181 Retrieval of hazardous material table text information
The method of ATMS operators is generalized for the case of Faddeev equations. The method to construct effective equations for both elastic scattering and scattering with rearrangement is presented. Properties to obtained equations are considered
Mohd Dani Baba; A Nasoruddin Mohamad
This paper examines the application of Asynchronous Transfer Mode (ATM) in a distributed industrial environment such as in teleoperation, which performs real time control manipulation from a remote location. In our study, two models of teleoperation are proposed; the first model is a point to point connection and the second model is through an ATM network. The performance results are analysed as to determine whether the two models can support the teleoperation traffics via simulation using commercial software design tool. (Author)
This book is a compilation of selected papers from the 4th ENRI International Workshop on ATM/CNS (EIWAC2015). The work focuses on novel techniques for aviation infrastructure in air traffic management (ATM) and communications, navigation, surveillance, and informatics (CNSI) domains. The contents make valuable contributions to academic researchers, engineers in the industry, and regulators of aviation authorities. As well, readers will encounter new ideas for realizing a more efficient and safer aviation system. .
Yang, Sung Woon; Kang, Soon Ju
This report presents the technical status of the ATM(Asynchronous Transfer Mode) as a new high speed data communication method. Since the FDDI(Fiber optic Distributed Data Interchange) backbone has been installed in september 1995, it has been used as a main network structure of KAERI. However, recently high speed and multimedia data communication environment is being required to accommodate the recent trend of the network usage in KAERI. For example, the rapid growth of Internet usage and increased activities of information retrieval systems on KAERI-Net demand more effective network system. Chapter 1 discusses the status of KAERI-Net and the selection criteria of a network model according to the national plan of super high speed network structure. In Chapter 2, the basic concept of ATM such as communication method and communication structure is studied, and Chapter 3 presents the overall concepts of standard model of ATM. In Chapter 4, we survey the recent trend of technical development of ATM and analyze the status of ATM technology. As a concluding remark, Chapter 5 discusses the criteria and check points for optimal design of KAERI-Net backbone. This report will be used as a technical reference for the installation of ATM in KAERI-Net. 10 tabs., 32 figs., 11 refs. (Author)
Nyati, Shyam; Young, Grant; Ross, Brian Dale; Rehemtulla, Alnawaz
Ataxia telangiectasia mutated (ATM) is a serine/threonine kinase critical to the cellular DNA-damage response, including DNA double-strand breaks (DSBs). ATM activation results in the initiation of a complex cascade of events facilitating DNA damage repair, cell cycle checkpoint control, and survival. Traditionally, protein kinases have been analyzed in vitro using biochemical methods (kinase assays using purified proteins or immunological assays) requiring a large number of cells and cell lysis. Genetically encoded biosensors based on optical molecular imaging such as fluorescence or bioluminescence have been developed to enable interrogation of kinase activities in live cells with a high signal to background. We have genetically engineered a hybrid protein whose bioluminescent activity is dependent on the ATM-mediated phosphorylation of a substrate. The engineered protein consists of the split luciferase-based protein complementation pair with a CHK2 (a substrate for ATM kinase activity) target sequence and a phospho-serine/threonine-binding domain, FHA2, derived from yeast Rad53. Phosphorylation of the serine residue within the target sequence by ATM would lead to its interaction with the phospho-serine-binding domain, thereby preventing complementation of the split luciferase pair and loss of reporter activity. Bioluminescence imaging of reporter expressing cells in cultured plates or as mouse xenografts provides a quantitative surrogate for ATM kinase activity and therefore the cellular DNA damage response in a noninvasive, dynamic fashion.
Boohaker, Rebecca J.; Cui, Xiaoli; Stackhouse, Murray; Xu, Bo
Purpose: Activation of the DNA damage responsive protein kinase ATM is a critical step for cellular survival in response to ionizing irradiation (IR). Direct targets of ATM regulating radiosensitivity remain to be fully investigated. We have recently reported that ATM phosphorylates the transcriptional repressor Snail on Serine 100. We aimed to further study the functional significance of ATM-mediated Snail phosphorylation in response to IR. Material and methods: We transfected vector-only, wild-type, the Serine 100 to alanine (S100A) or to glutamic acid (S100E) substitution of Snail into various cell lines. We assessed colony formation, γ-H2AX focus formation and the invasion index in the cells treated with or without IR. Results: We found that over-expression of the S100A mutant Snail in HeLa cells significantly increased radiosensitivity. Meanwhile the expression of S100E, a phospho-mimicking mutation, resulted in enhanced radio-resistance. Interestingly, S100E could rescue the radiosensitive phenotype in ATM-deficient cells. We also found that expression of S100E increased γ-H2AX focus formation and compromised inhibition of invasion in response to IR independent of cell survival. Conclusion: ATM-mediated Snail Serine 100 phosphorylation in response to IR plays an important part in the regulation of radiosensitivity
Chen, Wei-Ta; Ebelt, Nancy D; Stracker, Travis H; Xhemalce, Blerta; Van Den Berg, Carla L; Miller, Kyle M
Ataxia-telangiectasia mutated (ATM) protein kinase regulates the DNA damage response (DDR) and is associated with cancer suppression. Here we report a cancer-promoting role for ATM. ATM depletion in metastatic cancer cells reduced cell migration and invasion. Transcription analyses identified a gene network, including the chemokine IL-8, regulated by ATM. IL-8 expression required ATM and was regulated by oxidative stress. IL-8 was validated as an ATM target by its ability to rescue cell migration and invasion defects in ATM-depleted cells. Finally, ATM-depletion in human breast cancer cells reduced lung tumors in a mouse xenograft model and clinical data validated IL-8 in lung metastasis. These findings provide insights into how ATM activation by oxidative stress regulates IL-8 to sustain cell migration and invasion in cancer cells to promote metastatic potential. Thus, in addition to well-established roles in tumor suppression, these findings identify a role for ATM in tumor progression.
Sun, Chuan; Wei, Xiaoxia; Fei, Yue; Su, Liling; Zhao, Xinyuan; Chen, Guangdi; Xu, Zhengping
Radiofrequency electromagnetic fields (RF-EMFs) have been classified by the International Agency for Research on Cancer as possible carcinogens to humans; however, this conclusion is based on limited epidemiological findings and lacks solid support from experimental studies. In particular, there are no consistent data regarding the genotoxicity of RF-EMFs. Ataxia telangiectasia mutated (ATM) is recognised as a chief guardian of genomic stability. To address the debate on whether RF-EMFs are genotoxic, we compared the effects of 1,800 MHz RF-EMF exposure on genomic DNA in mouse embryonic fibroblasts (MEFs) with proficient (Atm +/+ ) or deficient (Atm -/- ) ATM. In Atm +/+ MEFs, RF-EMF exposure for 1 h at an average special absorption rate of 4.0 W/kg induced significant DNA single-strand breaks (SSBs) and activated the SSB repair mechanism. This effect reduced the DNA damage to less than that of the background level after 36 hours of exposure. In the Atm -/- MEFs, the same RF-EMF exposure for 12 h induced both SSBs and double-strand breaks and activated the two repair processes, which also reduced the DNA damage to less than the control level after prolonged exposure. The observed phenomenon is similar to the hormesis of a toxic substance at a low dose. To the best of our knowledge, this study is the first to report a hormesis-like effect of an RF-EMF.
Aronowitz, A.A.; Laagland, D.C.G.; Paulides, G.
This addendum to the report 'Value-added tax fraud in the European Union' gives additional information on the detection and settlement of VAT fraud in Belgium, Germany, the United Kingdom and the Netherlands. See link to the report at: More information.
Amaro, Andreia Ramos
Versão final (Esta versão contém as críticas e sugestões dos elementos do júri) Ao longo das últimas décadas e com a crescente globalização, os infratores têm adotado novos e sofisticados métodos de ocultação de capitais ilícitos, nomeadamente, provenientes da droga. Perante isto, o presente trabalho foca-se na temática do branqueamento de capitais e da fraude no mercado da droga, sendo o seu grande objetivo o estudo da relação entre branqueamento de capitais, fraude e o mercado da drog...
Gulati, Aman; Dubey, Prakash; MdFuzail, C.; Norman, Jasmine; Mangayarkarasi, R.
The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.
Full Text Available The History of world bussiness is full of ethics violation cases and financial scandals. Public can even see clearly the various economic crimes such as corruption, financial engineering and money laundering. These issues are always interesting since it involves tricks in information presentation which indicates a fraud. The application of forensic accounting and investigative audits is a solution to the anxiety of financial world. Forensic accounting and investigative audits in its simplest form is a blend between the disciplines of accounting, auditing and law. Forensic accounting is the use of accounting skills combined with the ability to solve a problem or alleged fraud. The investigative audit is an attempt to prove a mistake in accordance with the provisions of applicable law.
Full Text Available The legislative bodies of the countries, members of the accounting and auditing profession, various associations have taken a number of preventive measures and mechanisms for combating corporate criminal activities and financial frauds, but unfortunately, the fact is that even today they often happen in both undeveloped and the most developed market economies. It is therefore essential to pay significant attention to corporate criminal activity and financial frauds that are happening in the business world. The aim of this paper is to show the presence of different forms of corporate criminal activity at a global level, and to display a conceptual framework of criminal activity and motives for their doing. Concluding remarks of this paper provide guidelines for further research and recommendations on how to improve the mechanisms for preventing and detecting criminal activity.
Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountability. But partners are not paid until after their work is complete, and advertisers can extend this delay both to improve detection of improper partner practices and to punish partners who turn out to be rule-breakers. I capture these relationships in a screening model with delayed payments and probabilistic delayed observation of agents’ types. I derive conditions in which an advertising principal can set its payment delay to deter rogue agents and to attract solely or primarily good-type agents. Through the savings from excluding rogue agents, the principal can increase its profits while offering increased payments to good-type agents. I estimate that a leading affiliate network could have invoked an optimal payment delay to eliminate 71% of fraud without decreasing profit.
Full Text Available Fraud occurs both in the public and private sectors and is practiced most often in collusion with those around us, with colleagues, customers and suppliers targeting both material goods and goods from other categories. The consequences of fraud are enormous for the company and may threaten its existence and there is the possibility of putting its reputation at risk. Generally speaking, financial control acts and operations consist of documentary and factual verifications, written records of findings, appraisals and conclusions, as well as decisions on actions and possible coercions necessary to restore the compliance of controlled subjects’ financial activity with the law. Internal Auditing is a support function because it enables business managers and organizations to better manage their activities.
Full Text Available Penelitian ini bertujuan untuk mengetahui budaya yang memicu terjadinya fraud pada realisasi keuangan negara. Penelitian dilakukan pada instansi pemerintah daerah di Provinsi ABC. Metode etnografi ala Spradley dipilih untuk menemukan budaya pemicu tersebut. Hasil penelitian menunjukkan bahwa budaya yang memicu terjadinya fraud adalah budaya cari untung, yang terlihat dari kebiasaan “memanfaatkan” kebutuhan instansi, kebiasaan menyalahgunakan kewenangan yang dimiliki, dan kebiasaan menyiasati beberapa ketentuan keuangan negara pada PMK 113/PMK.05/2012 dan PMK 65/PMK.02/2015 untuk kepentingan pribadi maupun kelompok. Hasil penelitian ini memberikan informasi berupa bentuk-bentuk penyiasatan yang dilakukan, sehingga dapat dijadikan dasar sebagai bahan pertimbangan untuk perubahan atau perbaikan kebijakan dan peraturan yang disiasati tersebut
Setiani, N.; Huda, S. N.; Pulungan, R.; Winarko, E.
E-procurement has been applied in Indonesia since 2008 through the adoption of Electronic Procurement System (SPSE). The purpose of the use of SPSE in the procurement process is to improve the efficiency of goods or services procurement. In the bidding process, intensive communication and data exchange between providers and organizers are urgently needed. Through SPSE, the frequency of face to face meetings between providers and the committee can be reduced. This is expected to minimize potential fraud behaviors in the goods or services procurement conducted through the tender process. There exists a transformation of activities in the procurement through SPSE from the tender process that was previously done manually. In this paper, we analyze this transformation between manual procurement process and SPSE-based procurement process. The result of the analysis is exploited for investigating the possibility of fraud behavior transformations in every phase of e-procurement activities.
entails the tone at the top. Management’s integrity and ethical behavior sets the tone for the organization (COSO, 2013). A weak control environment can...the collusion category of fraud schemes are kickbacks, bribery , and deliberate split purchases. Kickbacks involve government officials receiving...something of value such as money from a contractor for personal gain in exchange for providing a favor such as submitting false invoices. Bribery
Directors are expected to be entrepreneurial while at the same time exercising prudent control. Enterprise and control are two sides of the directorial coin. Considers whether risk management professionals should do more in support of creativity, innovation, enterprise and entrepreneurship before turning to some cyber security and fraud control issues and dilemmas relating to data security breaches, the internet of things, protecting customer communications, and data sharing with collaborator...
Hooi, Bryan; Shah, Neil; Beutel, Alex; Gunnemann, Stephan; Akoglu, Leman; Kumar, Mohit; Makhija, Disha; Faloutsos, Christos
Review fraud is a pervasive problem in online commerce, in which fraudulent sellers write or purchase fake reviews to manipulate perception of their products and services. Fake reviews are often detected based on several signs, including 1) they occur in short bursts of time; 2) fraudulent user accounts have skewed rating distributions. However, these may both be true in any given dataset. Hence, in this paper, we propose an approach for detecting fraudulent reviews which combines these 2 app...
FRANCISCA NONYELUM OGWUELEKA
Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.
Rao, S A; Singh, N; Kumar, R; Thomas, A M
Digital photographs play a substantial role in the presentation and validation of clinical cases for documentation and research purposes in esthetically oriented professions such as dentistry. The introduction of sophisticated cameras and "easy to use" computer software readily available on today's market has enabled digital fraud to emerge as a common and widely used practice. Hence, it is essential that both dentists and editorial circles are aware and cautious with regard to the possibility of digital fraud. A set of 10 routine "pre-" and "post" treatment dental procedure photographs were taken and randomly manipulated using standard desktop software. A team of 10 dental professionals were selected and each one of them was individually requested to review and evaluate the authenticity of the photographs. An assessment of expert opinion revealed an overall sensitivity of 60% and a sensitivity of 15% in correctly identifying a manipulated photograph, which is considered low. Furthermore, there was poor interobserver agreement. Advanced technology that is easily available has resulted in adept digital fraud that is difficult to detect. There is a need for awareness among both dental practitioners and the editorial circle regarding misrepresentation due to image manipulation. It is therefore necessary to follow a skeptical approach in the assessment of digitalized photos used in research and as a part of clinical dentistry.
Basri Siti Aisyah
Full Text Available Whistleblowing is an internal control system that be a way to reduce or eradicate fraud. This paper focuses on investigating the reasons for whistleblowing is not a preferred method to eradicate fraud. This paper starts with defining the term “whistleblowing”. In its simplest form, whistleblowing involves the act of reporting improper conduct within an organisation to internal or external parties. This paper explains the issues and effects concerning whistleblowing. One of the issues is the violation of public trust. Lastly, this paper will describe the reasons for resistance of people to blow the whistle. Among the reasons is the fear of reprisal. This is a concept paper and it aims to conduct interview session with the Head for every local authority in Melaka. The findings of this paper can be used by the Government to create a new model related to whistleblowing to eradicate fraud in public sector. The Government could use this paper as the support to enhance the achievement of National Key Result Areas (NKRAs Against Corruption.
DNA damage checkpoints can be classified into G1/S, intra-S and G2/M checkpoints, so named according to the cell cycle transitions that they regulate. DNA damage incurred during the G1 or G2 phase of the cell cycle leads to growth arrest at the G1/S and G2/M phase boundaries, respectively, whereas genotoxic stress during S phase results in the transient suppression of DNA synthesis. In mammals, ATM (ataxia-telangiectasia mutated) is a protein kinase that controls all checkpoint responses to DNA damage. ATM is a versatile kinase which uses various means to regulate a given checkpoint pathway. It has been shown to act upon several proteins within the same pathway, many times controlling several different modifications of the same protein or using several different targets to arrive at the same end point. Some of the ATM targets act as adaptors by recruiting additional substrates for ATM. ATM controls two types of responses in G1. The p53-dependent responses inhibit Cyclin/Cdk activity by transcriptional induction of p21, whereas p53-independent responses inhibit CDKs through degradation of Cdc25A to maintain CdK2 inhibitory phosphorylation. In regulating p53, ATM directly phosphorylates p53 on Ser15, which likely causes p53 transcriptional activation, concurrently activating other kinases that phosphorylate p53 at other sites such as Ser20, which reduces the ability of MDM2 to bind p53, thus promoting its stability. ATM further ensures p53 stability by phosphorylating MDM2. At least six ATM targets, namely CHK2, CHK1, NBS1, BRCA1, SMC1 and FANCD2, have been implicated in the control of S-phase checkpoint. Cdc25A is the downstream effector of CHK1 and CHK2, though the underlying mechanism for control of intra S-phase checkpoint by other targets remain obscure. G2 checkpoint prevents mitotic entry solely through inhibitory phosphorylation of Cdc2/Cdk1. Several ATM targets including CHK1, CHK2, BRCA1, MDC1 and p53BP1 have been implicated in the control of G2/M
Baretić, Domagoj; Pollard, Hannah K.; Fisher, David I.; Johnson, Christopher M.; Santhanam, Balaji; Truman, Caroline M.; Kouba, Tomas; Fersht, Alan R.; Phillips, Christopher; Williams, Roger L.
ATM (ataxia-telangiectasia mutated) is a phosphatidylinositol 3-kinase–related protein kinase (PIKK) best known for its role in DNA damage response. ATM also functions in oxidative stress response, insulin signaling, and neurogenesis. Our electron cryomicroscopy (cryo-EM) suggests that human ATM is in a dynamic equilibrium between closed and open dimers. In the closed state, the PIKK regulatory domain blocks the peptide substrate–binding site, suggesting that this conformation may represent an inactive or basally active enzyme. The active site is held in this closed conformation by interaction with a long helical hairpin in the TRD3 (tetratricopeptide repeats domain 3) domain of the symmetry-related molecule. The open dimer has two protomers with only a limited contact interface, and it lacks the intermolecular interactions that block the peptide-binding site in the closed dimer. This suggests that the open conformation may be more active. The ATM structure shows the detailed topology of the regulator-interacting N-terminal helical solenoid. The ATM conformational dynamics shown by the structures represent an important step in understanding the enzyme regulation. PMID:28508083
Full Text Available The objective of this study was examining the factors affecting the government procurement fraud. Based on the fraud triangle and the theory of planned behavior, this study proposed seven hypothesis, those are tested by regression analysis. This study used primary data gathered by surveys to members of The Boards of the Republic Indonesia- Financial Auditors, who act as external auditors for the Government. They were asked to assess factors influencing the government procurement of goods and services fraud. There were 297 auditors of the Boards that participated in this survey. The result showed that the procurement frauds were influenced by the lack of procurement committee quality, the weakness of procurement control, and the intentions to engage fraud. The intentions to engage fraud were significantly influenced by the attitude toward fraud, subjective norms, and the perceived behavioral control. Furthermore, other elements of fraud triangle, the financial pressure, did not influence to the procurement fraud.
Pellegrini, Pablo A
Practices related to research misconduct seem to have been multiplied in recent years. Many cases of scientific fraud have been exposed publicly, and journals and academic institutions have deployed different measures worldwide in this regard. However, the influence of specific social and cultural environments on scientific fraud may vary from society to society. This article analyzes how scientists in Japan deal with accusations of scientific fraud. For such a purpose, a series of scientific fraud cases that took place in Japan has been reconstructed through diverse sources. Thus, by analyzing those cases, the social basis of scientific fraud and the most relevant aspects of Japanese cultural values and traditions, as well as the concept of honour which is deeply involved in the way Japanese scientists react when they are accused of and publicly exposed in scientific fraud situations is examined.
Full Text Available The paper analyses the forms, methods and causes of fraud that are perpetrated to the detriment of the budget of the European Union. The forms in which EU fraud appears are shown according to the criterion of kind of budgetary resource. Crime affecting the budgetary revenue of the EU tends to appear in the form of customs duty-evasion and false declarations concerning the customs-relevant information about goods. Crime adversely affecting the expenditure side of the EU budget appears in the form of subsidy fraud in the area of the Common Agricultural Policy, and subsidy fraud in the area of the structural policies. The methods used for the EU fraud committed and considered in the paper are document forgery, concealment of goods, corruption, violence and fictional business and evasion of the laws. In conclusion an explanation is given of the main exogenous criminogenic factors that lead to the EU frauds commonly perpetrated.
Full Text Available Accounting errors and fraud are common in most businesses, but there is a difference between fraud and misinterpretation of communication or accounting regulations. The role of management in preventing fraud becomes important in the last decades and the importance of auditing in curbing corruption is increasingly revealed. There is a strong connection between fraud and corruption, accelerated by electronic systems and modern platforms. The most recent developments tend to confirm that external auditing is curbing corruption, due to international accounting and auditing standards at national and regional levels. Thus, a better implementation of accounting standards and high quality of external control could prevent errors and fraud in accounting, and reduce corruption, as well. The aim of this paper is to present some particular aspects of errors and fraud in accounting, and how external audit could ensure accuracy and accountability in financial reporting.
Button, Mark; McNaughton Nicholls, Carol; Kerr, Jane; Owen, Rachael
Online frauds have become a major problem in many countries with millions of victims from a wide diversity of scams committed in full or part online. This paper explores the extent and nature of this problem. Using data from depth interviews with 15 online fraud victims, 6 focus groups with a further 48 online fraud victims and interviews with 9 professional stakeholders involved in combating this problem. The paper explores why victims fall for online scams. It identifies a range of reasons ...
Cooper, Tim J.; Wardell, Kayleigh; Garcia, Valerie; Neale, Matthew J.
Ataxia–telangiectasia mutated (ATM) and RAD3-related (ATR) are widely known as being central players in the mitotic DNA damage response (DDR), mounting responses to DNA double-strand breaks (DSBs) and single-stranded DNA (ssDNA) respectively. The DDR signalling cascade couples cell cycle control to damage-sensing and repair processes in order to prevent untimely cell cycle progression while damage still persists . Both ATM/ATR are, however, also emerging as essential factors in the process of meiosis; a specialised cell cycle programme responsible for the formation of haploid gametes via two sequential nuclear divisions. Central to achieving accurate meiotic chromosome segregation is the introduction of numerous DSBs spread across the genome by the evolutionarily conserved enzyme, Spo11. This review seeks to explore and address how cells utilise ATM/ATR pathways to regulate Spo11-DSB formation, establish DSB homeostasis and ensure meiosis is completed unperturbed
Cooper, Tim J.; Wardell, Kayleigh; Garcia, Valerie; Neale, Matthew J., E-mail: firstname.lastname@example.org
Ataxia–telangiectasia mutated (ATM) and RAD3-related (ATR) are widely known as being central players in the mitotic DNA damage response (DDR), mounting responses to DNA double-strand breaks (DSBs) and single-stranded DNA (ssDNA) respectively. The DDR signalling cascade couples cell cycle control to damage-sensing and repair processes in order to prevent untimely cell cycle progression while damage still persists . Both ATM/ATR are, however, also emerging as essential factors in the process of meiosis; a specialised cell cycle programme responsible for the formation of haploid gametes via two sequential nuclear divisions. Central to achieving accurate meiotic chromosome segregation is the introduction of numerous DSBs spread across the genome by the evolutionarily conserved enzyme, Spo11. This review seeks to explore and address how cells utilise ATM/ATR pathways to regulate Spo11-DSB formation, establish DSB homeostasis and ensure meiosis is completed unperturbed.
Full Text Available The telomeric protein TRF2 is required to prevent mammalian telomeres from activating DNA damage checkpoints. Here we show that overexpression of TRF2 affects the response of the ATM kinase to DNA damage. Overexpression of TRF2 abrogated the cell cycle arrest after ionizing radiation and diminished several other readouts of the DNA damage response, including phosphorylation of Nbs1, induction of p53, and upregulation of p53 targets. TRF2 inhibited autophosphorylation of ATM on S1981, an early step in the activation of this kinase. A region of ATM containing S1981 was found to directly interact with TRF2 in vitro, and ATM immunoprecipitates contained TRF2. We propose that TRF2 has the ability to inhibit ATM activation at telomeres. Because TRF2 is abundant at chromosome ends but not elsewhere in the nucleus, this mechanism of checkpoint control could specifically block a DNA damage response at telomeres without affecting the surveillance of chromosome internal damage.
Full Text Available This research aims to determine whether there is a simultaneous and partial influence between the pressure, opportunity, rationalization, capability, greed, need and exposure of academic fraud on students competency accounting expertise SMK Negeri 1 Kendal. Population in this research are students of accounting expertise skill SMK Negeri 1 Kendal a number of 319 students. Sampling technique in this research is saturated sample. Data collection methods using questionnaires and documentation. The method of analysis used is descriptive analysis and multiple linear regression analysis. The results showed that there was a positive and significant influence simultaneously to academik farud of 59.4%, there is a positive and significant influence pressure on academic fraud by 2.4%, there is a positive and significant influence opportunity on academic fraud by 1.46%, there is a positif and significant influence rationalization on academik fraud by 1.54%, there is a positie and significant influence capability on academic fraud by 4.28%, there is a positive and significant influence greed on academic fraud by 2.96%, there is a positive and significant influence need on academic fraud by 1.59%, and there is a negative and siignificant exposure on academic fraud by -11,8%. The conclusion in this research is that pressure, opportunity, rationalization, capability, greed, need and exposure have positive and significant influence to academik fraud. Suggestions for futher researchers are expected to use analytical tools other than SPSS.
Reinstein, A; Dery, R J
The American Institute of Certified Public Accountants' Statement on Auditing Standards (SAS) No. 82, Consideration of Fraud in a Financial Statement Audit, requires independent auditors to obtain reasonable assurance that financial statements are free of material mis-statements caused by error or fraud. SAS No. 82 provides guidance for independent auditors to use to help detect and document risk factors related to potential fraud. But while SAS No. 82 suggests how auditors should assess the potential for fraud, it does not expand their detection responsibility. Accordingly, financial managers should discuss thoroughly with auditors the scope and focus of an audit as a means to further their compliance efforts.
Lavin, Martin F.; Birrell, Geoff; Chen, Philip; Kozlov, Sergei; Scott, Shaun; Gueven, Nuri
DNA double strand breaks represent the most threatening lesion to the integrity of the genome in cells exposed to ionizing radiation and radiomimetic chemicals. Those breaks are recognized, signaled to cell cycle checkpoints and repaired by protein complexes. The product of the gene (ATM) mutated in the human genetic disorder ataxia-telangiectasia (A-T) plays a central role in the recognition and signaling of DNA damage. ATM is one of an ever growing number of proteins which when mutated compromise the stability of the genome and predispose to tumour development. Mechanisms for recognising double strand breaks in DNA, maintaining genome stability and minimizing risk of cancer are discussed
Iwahori, Satoko; Kohmon, Daisuke; Kobayashi, Junya; Tani, Yuhei; Yugawa, Takashi; Komatsu, Kenshi; Kiyono, Tohru; Sugimoto, Nozomi; Fujita, Masatoshi
Ataxia-telangiectasia mutated (ATM) plays crucial roles in DNA damage responses, especially with regard to DNA double-strand breaks (DSBs). However, it appears that ATM can be activated not only by DSB, but also by some changes in chromatin architecture, suggesting potential ATM function in cell cycle control. Here, we found that ATM is involved in timely degradation of Cdt1, a critical replication licensing factor, during the unperturbed S phase. At least in certain cell types, degradation of p27Kip1 was also impaired by ATM inhibition. The novel ATM function for Cdt1 regulation was dependent on its kinase activity and NBS1. Indeed, we found that ATM is moderately phosphorylated at Ser1981 during the S phase. ATM silencing induced partial reduction in levels of Skp2, a component of SCFSkp2 ubiquitin ligase that controls Cdt1 degradation. Furthermore, Skp2 silencing resulted in Cdt1 stabilization like ATM inhibition. In addition, as reported previously, ATM silencing partially prevented Akt phosphorylation at Ser473, indicative of its activation, and Akt inhibition led to modest stabilization of Cdt1. Therefore, the ATM-Akt-SCFSkp2 pathway may partly contribute to the novel ATM function. Finally, ATM inhibition rendered cells hypersensitive to induction of re-replication, indicating importance for maintenance of genome stability. PMID:24280901
Sergei V. Arzhenovskii
Full Text Available Modern economic development is accompanied by the increasing complexity of the relationship structure, intercompany transactions, the requirements for information disclosure on the entity’s activities. It leads to the opportunities growth of fraudulent representation public companies reporting. The external audit is considered as an institution that resists to negative processes. The issues of improving the tools that assessing the risk of material misstatement of the financial statements due to fraud from the standpoint the fraud theory have been examined here. Determining potential areas in which methodology for risk assessment of material misstatement of the financial statements due to fraud in an audit are based on the modern fraud theory interpretations will be develop. Functional and structural, comparative, logical and historical, deductive and inductive analyst methods have been used. Retrospective analysis on research areas in the fraud theory field has been performed. Perspective directions for improving methodology and methods for risk assessment of material misstatement of the financial statements in an audit have been identified. Methodology development for fraud risk assessment procedures in an audit of financial statements is based on “fraud diamond” theory. Creating new interpretations the fraud theory during last fifteen years is a consequence the expansion opportunities for corporate fraud, one of the most common species which is the financial statements falsification. Changing the list of factors that could initiate the fraud in the company's public reporting requires that the methods of its identification during the audit should be improved. Methodology and methods risk assessment of intentional material misstatement of the financial statements need to be improved in the direction both the modern modification of fraud theory.
D. Yuan; E. Doak; P. Guss; A. Will
To incorporate the georegistration and restoration processes into airborne data processing in support of U.S. Department of Energy's nuclear emergency response task, we developed an adaptive restoration filter for airborne Daedalus AADS1268 ATM thermal data based on the Wiener filtering theory. Preliminary assessment shows that this filter enhances the detectability of small weak thermal anomalies in AADS1268 thermal images
Guenther, R.J.; Blahnik, D.E.; Campbell, T.K.; Jenquin, U.P.; Mendel, J.E.; Thornhill, C.K.
The characterization data obtained to date are described for Approved Testing Material (ATM)-106 spent fuel from Assembly BT03 of pressurized-water reactor Calvert Cliffs No. 1. This report is one in a series being prepared by the Materials Characterization Center at Pacific Northwest Laboratory on spent fuel ATMs. The ATMs are receiving extensive examinations to provide a source of well- characterized spent fuel for testing in the US Department of Energy Office of Civilian Radioactive Waste Management (OCWRM) program. ATM-106 consists of 20 full-length irradiated fuel rods with rod-average burnups of about 3700 GJ/kgM (43 MWd/kgM) and expected fission gas release of /approximately/10%. Characterization data include (1) as-fabricated fuel design, irradiation history, and subsequent storage and handling; (2) isotopic gamma scans; (3) fission gas analyses; (4) ceramography of the fuel and metallography of the cladding; (5) calculated nuclide inventories and radioactivities in the fuel and cladding; and (6) radiochemical analyses of the fuel and cladding. Additional analyses of the fuel rod are being conducted and will be included in planned revisions of this report. 12 refs., 110 figs., 81 tabs
Jorgensen, T.J.; Shiloh, Y.
Ataxia-telangiectasia (A-T) is the classic human genetic disease involving severe ionizing radiation sensitivity and as such has been intensely studied by radiation biologists over the years. Unlike its counterpart for UV light sensitivity -xeroderma pigmentosum - A-T has no obvious DNA repair defect; and there has been much speculation as to the mechanism underlying the altered radioresponses associated with this disease. The gene defective in A-T (ATM) has recently been cloned, and its primary coding sequence determined. The primary sequence of the ATM protein suggests that it has some regulatory functions related to cellular radioresponse and maintenance of genomic stability, and shares these functions with a growing family of other proteins in various organisms. At this juncture it is appropriate to review our current knowledge about the radiobiology of A-T and reflect on the possible radiobiological mechanisms that are suggested by the ATM gene itself. This article will attempt briefly to review current knowledge about the radiobiology of A-T and to introduce new speculations about underlying radiobiological mechanisms that are suggested by the primary amino acid sequence of the predicted ATM gene product. (Author)
Stracker, Travis H.; Roig, Ignasi; Knobel, Philip A.; Marjanović, Marko
The DNA damage response (DDR) rapidly recognizes DNA lesions and initiates the appropriate cellular programs to maintain genome integrity. This includes the coordination of cell cycle checkpoints, transcription, translation, DNA repair, metabolism, and cell fate decisions, such as apoptosis or senescence (Jackson and Bartek, 2009). DNA double-strand breaks (DSBs) represent one of the most cytotoxic DNA lesions and defects in their metabolism underlie many human hereditary diseases characterized by genomic instability (Stracker and Petrini, 2011; McKinnon, 2012). Patients with hereditary defects in the DDR display defects in development, particularly affecting the central nervous system, the immune system and the germline, as well as aberrant metabolic regulation and cancer predisposition. Central to the DDR to DSBs is the ataxia-telangiectasia mutated (ATM) kinase, a master controller of signal transduction. Understanding how ATM signaling regulates various aspects of the DDR and its roles in vivo is critical for our understanding of human disease, its diagnosis and its treatment. This review will describe the general roles of ATM signaling and highlight some recent advances that have shed light on the diverse roles of ATM and related proteins in human disease. PMID:23532176
Le but de cette note est de résumer les premières caractéristiques de l'intégration de 2 modules ATM pour le projet FP420 (voir note technique EDMS n° 743628) ainsi que la liste des problèmes découverts à ce jour sur l
Mar 6, 2017 ... Results: We did not detect the ATM c.7271T > G and c.1066–6T > G (IVS10–6T > G) .....  Lavin MF, Shiloh Y. The genetic defect in ataxia-telangiectasia. ....  Inskip HM, Kinlen LJ, Taylor AM, Woods CG, Arlett CF. Risk of ...
Travis H. Stracker
Full Text Available The DNA damage response (DDR rapidly recognizes DNA lesions and initiates the appropriate cellular programs to maintain genome integrity. This includes the coordination of cell cycle checkpoints, transcription, translation, DNA repair, metabolism and cell fate decisions, such as apoptosis or senescence(Jackson and Bartek, 2009. DNA double-strand breaks (DSBs represent one of the most cytotoxic DNA lesions and defects in their metabolism underlie many human hereditary diseases characterized by genomic instability(Stracker and Petrini, 2011;McKinnon, 2012. Patients with hereditary defects in the DDR display defects in development, particularly affecting the central nervous system (CNS, the immune system and the germline, as well as aberrant metabolic regulation and cancer predisposition. Central to the DDR to DSBs is the ATM kinase, a master controller of signal transduction. Understanding how ATM signaling regulates various aspects of the DDR and its roles in vivo is critical for our understanding of human disease, its diagnosis and its treatment. This review will describe the general roles of ATM signaling and highlight some recent advances that have shed light on the diverse roles of ATM and related proteins in human disease.
Guenther, R.J.; Blahnik, D.E.; Campbell, T.K.; Jenquin, U.P.; Mendel, J.E.; Thomas, L.E.; Thornhill, C.K.
The characterization data obtained to data are described for Approved Testing Material 105 (ATM-105), which is spent fuel from Bundles CZ346 and CZ348 of the Cooper Nuclear Power Plant, a boiling-water reactor. This report is one in a series being prepared by the Materials Characterization Center at Pacific Northwest Laboratory (PNL) on spent fuel ATMs. The ATMs are receiving extensive examinations to provide a source of well-characterized spent fuel for testing in the US Department of Energy Office of Civilian Radioactive Waste Management (OCRWM) Program. ATM-105 consists of 88 full-length irradiated fuel rods with rod-average burnups of about 2400 GJ/kgM (28 MWd/kgM) and expected fission gas release of about 1%. Characterization data include (1) descriptions of as-fabricated fuel design, irradiation history, and subsequent storage and handling; (2) isotopic gamma scans; (3) fission gas analyses; (4) ceramography of the fuel and metallography of the cladding; (5) special fuel studies involving analytical transmission electron microscopy (AEM); (6) calculated nuclide inventories and radioactivities in the fuel and cladding; and (7) radiochemical analyses of the fuel and cladding. Additional analyses of the fuel are being conducted and will be included in planned revisions of this report.
Bueno, R C; Canevari, R A; Villacis, R A R
BACKGROUND: Ataxia telangiectasia-mutated (ATM) gene downexpression has been reported in sporadic breast carcinomas (BC); however, the prognostic value and mechanisms of ATM deregulation remain unclear. PATIENTS AND METHODS: ATM and miRNAs (miR-26a, miR-26b, miR-203, miR-421, miR-664, miR-576-5p...... and miR-18a) expression levels were evaluated by quantitative real-time PCR (RT-qPCR) in 52 BC and 3 normal breast samples. ATM protein expression was assessed by immunohistochemistry in 968 BC and 35 adjacent normal breast tissues. ATM copy number alteration was detected by array comparative genomic...... hybridization (aCGH) in 42 tumours. RESULTS: Low ATM levels were associated with tumour grade. Absence of ATM protein expression was associated with distant metastasis (P ATM...
Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of “global health corruption” and development of a treaty protocol to combat this crucial issue. PMID:23088820
Mackey, Tim K; Liang, Bryan A
Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of "global health corruption" and development of a treaty protocol to combat this crucial issue.
Raluca – Ionela Radu
Full Text Available According to international auditing standards, fraud is an intentionally action realised by one or more persons as management, employees or third parties, action that generate erroneous interpretation of financial statements. The real intention is to cheat. However, there can be involved some erroneous calculus generated by creative accounting. The concept of “error” refers to unintentionally mistakes that could appear in financial statements. We think there could be mathematical or accounting mistakes, unintentionally omission, or wrong interpretation of certain facts, accounting policies wrong application. All these actions are unwittingly. It is very important to identify situations cause and take necessary measures to eliminate them
De Cristofaro, E.; Friedman, A.; Jourjon, G.; Kaafar, M. A.; Shafiq, M. Z.
Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of profiles that also like other pages to elude fraud protection algorithms, however, to the best of ou...
De Cristofaro, Emiliano; Friedman, Arik; Jourjon, Guillaume; Kaafar, Mohamed Ali; Shafiq, M. Zubair
Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of profiles that also like other pages to elude fraud protection algorithms, however, to the best of ou...
Full Text Available The article is a brief overview of tax evasion as a complex social and economicphenomenon, of utmost importance, that today’s states confront with; its consequences seek to limitas much as possible, by legal and fiscal means, the eradication, which, at this point, is virtuallyimpossible. Tax evasion can be analysed from two points of view, the legal and the illegal aspect ofthe phenomenon or the fiscal fraud. The “fiscal paradises” had a very important role in the last years’activity.
In 1995, the French taxation authorities have identified 1849 violations of law concerning the petroleum products, which correspond to a 53% increase with respect to 1994. The discovery of these frauds has permitted the recovery of 85 millions of French Francs (MFF) of taxes and rights, from which 61.1 MFF correspond to the internal tax on petroleum products (TIPP). In France, the TIPP represents 65% of the customs receipts and about 10% of the gross fiscal receipt of the general budget of the nation. Such delinquency actions can exist at any step of the petroleum file from the production to the storage of petroleum products. (J.S.)
Rimkus, Stacey A; Wassarman, David A
Ataxia-telangiectasia (A-T) is a neurodegenerative disease caused by mutation of the A-T mutated (ATM) gene. ATM encodes a protein kinase that is activated by DNA damage and phosphorylates many proteins, including those involved in DNA repair, cell cycle control, and apoptosis. Characteristic biological and molecular functions of ATM observed in mammals are conserved in Drosophila melanogaster. As an example, conditional loss-of-function ATM alleles in flies cause progressive neurodegeneration through activation of the innate immune response. However, unlike in mammals, null alleles of ATM in flies cause lethality during development. With the goals of understanding biological and molecular roles of ATM in a whole animal and identifying candidate therapeutics for A-T, we performed a screen of 2400 compounds, including FDA-approved drugs, natural products, and bioactive compounds, for modifiers of the developmental lethality caused by a temperature-sensitive ATM allele (ATM8) that has reduced kinase activity at non-permissive temperatures. Ten compounds reproducibly suppressed the developmental lethality of ATM8 flies, including Ronnel, which is an organophosphate. Ronnel and other suppressor compounds are known to cause mitochondrial dysfunction or to inhibit the enzyme acetylcholinesterase, which controls the levels of the neurotransmitter acetylcholine, suggesting that detrimental consequences of reduced ATM kinase activity can be rescued by inhibiting the function of mitochondria or increasing acetylcholine levels. We carried out further studies of Ronnel because, unlike the other compounds that suppressed the developmental lethality of homozygous ATM8 flies, Ronnel was toxic to the development of heterozygous ATM8 flies. Ronnel did not affect the innate immune response of ATM8 flies, and it further increased the already high levels of DNA damage in brains of ATM8 flies, but its effects were not harmful to the lifespan of rescued ATM8 flies. These results provide
Michele Rílany Rodrigues Machado
Full Text Available This research examined if Cressey’s (1953 fraud triangle and the agency theory, jointly, enables investigate corporate fraud occurrence in Brazilian banking institutions. It was formulated six research hypotheses were segregated in fraud triangle – pressure, opportunity and rationalization – and measured by variables taken from the agency theory, criminology and empirical papers on corporate fraud. The identification of probability of fraud occurrence was operationalized from multinomial logistic model, applied to data of 44 banking, for the period between January 2001 and December 2012. For element pressure, hypotheses No. 01 was confirmed, since this showed that the lower an institution’s previous performance, the greater probability there is of fraudulent events occurring in the future. In the element of opportunity, the hypothesis No. 03 was confirmed, which showed that low corporate governance indicators increased the possibility of fraud occurrences. In rationalization element, the hypothesis No. 08 was confirmed, therefore, the predominance of women in management reduces the probability of fraud. We thereby conclude that Cressey’s Triangle, when combined with the theory of agency is an appropriate research instrument to use when carrying out an investigation into corporate fraud occurrence in banking institutions.
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of Inspector General Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical Equipment Suppliers AGENCY: Office of Inspector...) 205-0007. SUPPLEMENTARY INFORMATION: In our publication of the OIG Updated Special Fraud Alert on...
Full Text Available This study examines factors affecting fraud in the procurement of government’s goods and services from the independent auditor’s point of view. Based on fraud triangles and theory of planned behavior, this study proposes seven hypotheses which were tested using structural equation model (SEM-partial least square. This study used primary data gathered by survey to auditors of Audit Board of the Republic of Indonesia in its head office and several selected representative offices. Respondents were asked to provide their answer/perception for questions in questionnaire regarding factors influencing the procurement fraud of government’s goods and services. The results show that the procurement frauds are significantly influenced by weaknesses in procurement system, lack of procurement committee's quality, and the intention to engage fraud. Furthermore, the intention to engage fraud are influenced by attitude, subjective norms, and the perceived behavioral control. These findings suggest that procurement frauds are associated with individual factors as rationalization and opportunities. These factors could be considered when designing internal control structure to restrain fraud behavior.
Thornton, Dallas; van Capelleveen, Guido; Poel, Mannes; van Hillegersberg, Jos; Mueller, Roland
Fraud, waste, and abuse in the U.S. healthcare system are estimated at $700 billion annually. Predictive analytics offers government and private payers the opportunity to identify and prevent or recover such billings. This paper proposes a data-driven method for fraud detection based on comparative
... activity do not apply to any debt based in whole or in part on conduct in violation of the antitrust laws... in whole or in part on conduct in violation of the antitrust laws or any claim involving fraud, the... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Antitrust, fraud, and tax and...
Pickett, Justin T; Roche, Sean Patrick
Data fraud and selective reporting both present serious threats to the credibility of science. However, there remains considerable disagreement among scientists about how best to sanction data fraud, and about the ethicality of selective reporting. The public is arguably the largest stakeholder in the reproducibility of science; research is primarily paid for with public funds, and flawed science threatens the public's welfare. Members of the public are able to make meaningful judgments about the morality of different behaviors using moral intuitions. Legal scholars emphasize that to maintain legitimacy, social control policies must be developed with some consideration given to the public's moral intuitions. Although there is a large literature on popular attitudes toward science, there is no existing evidence about public opinion on data fraud or selective reporting. We conducted two studies-a survey experiment with a nationwide convenience sample (N = 821), and a follow-up survey with a representative sample of US adults (N = 964)-to explore community members' judgments about the morality of data fraud and selective reporting in science. The findings show that community members make a moral distinction between data fraud and selective reporting, but overwhelmingly judge both behaviors to be immoral and deserving of punishment. Community members believe that scientists who commit data fraud or selective reporting should be fired and banned from receiving funding. For data fraud, most Americans support criminal penalties. Results from an ordered logistic regression analysis reveal few demographic and no significant partisan differences in punitiveness toward data fraud.
... 25 Indians 2 2010-04-01 2010-04-01 false Fraud or false statement in a Government matter. 700.541... RELOCATION PROCEDURES Employee Responsibility and Conduct § 700.541 Fraud or false statement in a Government..., applications for employment, personnel security forms, requests for travel reimbursement, client certification...
... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS General § 1522.3 Fraud and intentional falsification...
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 32.9 Section 32.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.9 Fraud in connection with commodity...
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Responsibilities of Passengers and Other Individuals and Persons § 1540.103 Fraud... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Fraud and misrepresentation. 240.15c1-2 Section 240.15c1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Rules Relating to Over-The-Counter Markets § 240.15c1-2 Fraud and...
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 33.10 Section 33.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.10 Fraud in...
... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.5 Fraud and intentional falsification of records. No person may make, cause to be...
Gold, A.H.; Knechel, W.R.; Wallage, P.
We investigate how the strictness of a requirement to consult on potential client fraud affects auditors' propensity to consult with firm experts. We consider two specific forms of guidance about fraud consultations: (1) strict, i.e., mandatory and binding; and (2) lenient, i.e., advisory and
Sharma, Anuj; Kumar Panigrahi, Prabin
With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud, collective known as forensic accounting. Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection. The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field. The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data.
In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to contract fraud.
In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to grant fraud.
van der Meulen, N.S.
This contribution provides a critical analysis of the treatment of consumer liability in cases of Internet banking fraud. Whereas generally banks refund the financial losses associated with Internet banking fraud to the individual victim, exceptions do occur, at least in certain EU jurisdictions.
Book review of: Neoliberal Moral Economy: Capitalism, Socio-Cultural Change & Fraud in Uganda by Jörg Wiegratz. London and New York, Rowman & Littlefield, 2016, 375 pp. ISBN 9781783488537.......Book review of: Neoliberal Moral Economy: Capitalism, Socio-Cultural Change & Fraud in Uganda by Jörg Wiegratz. London and New York, Rowman & Littlefield, 2016, 375 pp. ISBN 9781783488537....
... Fault. 149.41 Section 149.41 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS... Eligible Employment-Based Plans § 149.41 Consequences of Non-Compliance, Fraud, or Similar Fault. Upon failure to comply with the requirements of this part, or if fraud, waste, and abuse, or similar fault are...
Full Text Available European VAT fraud has been growing at an alarming rate . The level of VAT losses for one year is between €60bn and €100bn for all member states. This level of fraud has created an urgent need for Europe to address the issue of the reform of the VAT system.
Heautot, J F; Eichelberg, M; Gibaud, B; Tréguier, C; Lemoine, D; Scarabin, J M; Piqueras, J; Carsin, M; Gandon, Y
The RETAIN project (Radiological Examinations Transfer on an ATM Integrated Network) has aimed at testing videoconferencing and DICOM image transfers to get advice about difficult radiological cases over an asynchronous transfer mode (ATM)-based network, which affords a more comfortable interface than narrow-band networks and allows exchange of complete image series using the DICOM format of studies. For this purpose, an experimental ATM network was applied between six university hospitals in four different countries. An assessment of the functionalities of the system was performed by means of log-file analysis, video recording of the sessions and forms filled out by the participants at the end of each session. Questionnaires were answered by the users at the end of the project to bring out perspectives of utilisation and added value. We discussed 43 cases during 20 sessions. For technical or organisational problems, only 20 of the 36 planned sessions took place. The throughput over ATM (10.5 Mbit/s, 20 times faster than six ISDN B-channels) was adequate. Despite the experimental configuration of the network, the system was considered as satisfactory by all the physicians. In 72 % of the sessions, the expected result (answer to the question) was gained. By common consent, videoconferencing was unanimously regarded as a prominent tool in improving the interaction quality. Asynchronous transfer mode is an efficient method for fast transferring of radiologic examinations in DICOM format and for discussing them through high-quality videoconferencing.
Apr 19, 2011 ... At this point in time, it is pertinent to ask, what is ATM? ATM is Automated .... can be installed on ATMs running Microsoft Windows XP operating system that records sensitive ... almost real time bank services. The citizens of ...
Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars
In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....
Madsen, Jens Kargaard; Lassen, Peter Stuhr
This paper describes the design and implementation of a high speed GaAs ATM Mux Demur ASIC (AMDA) which is the key element in a high speed ATM Add-Drop unit. This unit is used in a new distributed ATM multiplexing-demultiplexing architecture for broadband switching systems. The Add-Drop unit...
Automated Teller Machine (ATM) technology has had its significant impact in banking system in Nigeria and some other West African Countries. The most significant impact of ATM technology is the customer's ability to withdraw money outside banking hours. But this feat achieved by ATM technology is not without ...
Full Text Available There are many theories which seek to explain fraud victimisation. In particular, older victims find themselves at the intersection of various discourses which account for victimisation, primarily from a deficit model. This article examines two discourses relevant to older fraud victims. The first positions older victims of crime as weak and vulnerable and the second positions fraud victims generally as greedy and gullible. Using interviews with twenty-one Canadian volunteers who provide telephone support to older fraud victims (all seniors themselves, this article analyses the extent to which these two discourses are evident in the understandings of these volunteers. It finds that volunteers overwhelmingly perceive fraud to occur out of loneliness and isolation of the victim, and actively resist victim blaming narratives towards these individuals. While neither discourse is overly positive, the article discusses the implications of these discourses for the victims themselves and for their ability to access support.
Financial statement audits are still comparatively poor in fraud detection. Forensic specialists can play a significant role in increasing audit quality. In this paper, based on prior academic research, I develop a model of fraud detection and the incorporation of forensic specialists in the audit...... process. The intention of the model is to identify the reasons why the audit is weak in fraud detection and to provide the analytical framework to assess whether the incorporation of forensic specialists can help to improve it. The results show that such specialists can potentially improve the fraud...... detection in the audit, but might also cause some negative implications. Overall, even though fraud detection is one of the main topics in research there are very few studies done on the subject of how auditors co-operate with forensic specialists. Thus, the paper concludes with suggestions for further...
Luiz Carlos Jacob Perera
Full Text Available Este estudio investigó la eficacia del sistema de control interno (SCI en la lucha contra el fraude corporativo. Con el apoyo de una encuesta respondida por 156 profesionales de la auditoría fue posible tener ámbito nacional. Entre los principales resultados, se encontró que las actividade s relacionadas con SCI han desempeñado sus funciones de manera eficiente para combatir el fraude corporativo. Considerando las tres ramas del Árbol de Fraude : " la corrupción y la malversación de activos, son fraudes que se abordan de manera más eficaz por el canal de denuncias, los controles internos y el compliance; ocurrencia de fraudes en las "declaraciones financieros", por lo general vinculados al alto escalon de las empresas, se perciben con mayor precisión mediante una auditoría externa.
..., Washington, DC 22202-2884. (ii) Department of Homeland Security (DHS) fraud hotline poster identified in... _________ _________ _________ _________ (Contracting Officer shall insert-- (i) Title of applicable Department of Homeland Security fraud hotline...-AG98 Defense Federal Acquisition Regulation Supplement; Display of DoD Inspector General Fraud Hotline...
... the title of the applicable Department of Homeland Security (DHS) fraud hotline poster and Web site(s... General Fraud Hotline Posters AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work...
Doosti, Abbas; Ghasemi Dehkordi, Payam; Rahimi, Ebrahim
Detection of species fraud in meat products is important for consumer protection and food industries. A molecular technique such as PCR method for detection of beef, sheep, pork, chicken, donkey, and horse meats in food products was established. The purpose of this study was to identification of fraud and adulteration in industrial meat products by PCR-RFLP assay in Iran. In present study, 224 meat products include 68 sausages, 48 frankfurters, 55 hamburgers, 33 hams and 20 cold cut meats were collected from different companies and food markets in Iran. Genomic DNA was extracted and PCR was performed for gene amplification of meat species using specific oligonucleotid primers. Raw meat samples are served as the positive control. For differentiation between donkey's and horse's meat, the mitochondrial DNA segment (cytochrome-b gene) was amplified and products were digested with AluI restriction enzyme. Results showed that 6 of 68 fermented sausages (8.82%), 4 of 48 frankfurters (8.33%), 4 of 55 hamburgers (7.27%), 2 of 33 hams (6.6%), and 1 of 20 cold cut meat (5%) were found to contain Haram (unlawful or prohibited) meat. These results indicate that 7.58% of the total samples were not containing Halal (lawful or permitted) meat and have another meat. These findings showed that molecular methods such as PCR and PCR-RFLP are potentially reliable techniques for detection of meat type in meat products for Halal authentication.
Pollyanna Gomes dos Santos
Full Text Available A partir da diferenciação entre plágio, fraude e estratégia ficcional, objetiva-se, neste ensaio, analisar a construção de textos literários que tenham uma possível conotação entre escrita e crime. Como afirma Anatol Rosenfeld, a fraude literária é tão antiga quanto a própria literatura. Um dos títulos escolhidos para esta pesquisa é Fragmentos: memórias de uma infância 1939-1948, de Binjamin Wilkomirski. No livro, o autor-narrador relata que foi prisioneiro de campos de concentração e sobrevivente da Segunda Guerra Mundial. Após o enorme sucesso que o livro alcançou e apreciações positivas por parte de críticos literários em todo o mundo, descobriu-se, enfim, que sua história não era verdadeira.
Stylianos S. Mamais
Full Text Available Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to forgery as non-human operators are able to artificially create fictitious traffic on digital platforms for the purpose of committing financial fraud. This places a significant strain on Advertisers who have no effective means of differentiating fabricated Ad-Reports from those which correspond to real consumer activity. To address this problem, we contribute an advert reporting system which utilizes opportunistic networking and a blockchain-inspired construction in order to identify authentic Ad-Reports by determining whether they were composed by honest or dishonest users. What constitutes a user’s honesty for our system is the manner in which they access adverts on their mobile device. Dishonest users submit multiple reports over a short period of time while honest users behave as consumers who view adverts at a balanced pace while engaging in typical social activities such as purchasing goods online, moving through space and interacting with other users. We argue that it is hard for dishonest users to fake honest behaviour and we exploit the behavioural patterns of users in order to classify Ad-Reports as real or fabricated. By determining the honesty of the user who submitted a particular report, our system offers a more secure reward-claiming model which protects against fraud while still preserving the user’s anonymity.
Wang, Chen; Jette, Nicholas; Moussienko, Daniel; Bebb, D Gwyn; Lees-Miller, Susan P
The ataxia telangiectasia mutated (ATM) protein kinase plays a central role in the cellular response to DNA damage. Loss or inactivation of both copies of the ATM gene (ATM) leads to ataxia telangiectasia, a devastating childhood condition characterized by neurodegeneration, immune deficiencies, and cancer predisposition. ATM is also absent in approximately 40% of mantle cell lymphomas (MCLs), and we previously showed that MCL cell lines with loss of ATM are sensitive to poly-ADP ribose polymerase (PARP) inhibitors. Next-generation sequencing of patient tumors has revealed that ATM is altered in many human cancers including colorectal, lung, prostate, and breast. Here, we show that the colorectal cancer cell line SK-CO-1 lacks detectable ATM protein expression and is sensitive to the PARP inhibitor olaparib. Similarly, HCT116 colorectal cancer cells with shRNA depletion of ATM are sensitive to olaparib, and depletion of p53 enhances this sensitivity. Moreover, HCT116 cells are sensitive to olaparib in combination with the ATM inhibitor KU55933, and sensitivity is enhanced by deletion of p53. Together our studies suggest that PARP inhibitors may have potential for treating colorectal cancer with ATM dysfunction and/or colorectal cancer with mutation of p53 when combined with an ATM kinase inhibitor. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.
Darlington, Yolanda; Nguyen, Thuy-Ai; Moon, Sung-Hwan; Herron, Alan; Rao, Pulivarthi; Zhu, Chengming; Lu, Xiongbin; Donehower, Lawrence A.
Wildtype p53-Induced Phosphatase 1 (WIP1) is a serine/threonine phosphatase that dephosphorylates proteins in the ataxia telangiectasia mutated (ATM)-initiated DNA damage response pathway. WIP1 may play a homeostatic role in ATM signaling by returning the cell to a normal pre-stress state following completion of DNA repair. To better understand the effects of WIP1 on ATM signaling, we crossed Atm-deficient mice to Wip1-deficient mice and characterized phenotypes of the double knockout progeny. We hypothesized that the absence of Wip1 might rescue Atm deficiency phenotypes. Atm null mice, like ATM-deficient humans with the inherited syndrome ataxia telangiectasia, exhibit radiation sensitivity, fertility defects, and are T-cell lymphoma prone. Most double knockout mice were largely protected from lymphoma development and had a greatly extended lifespan compared to Atm null mice. Double knockout mice had increased p53 and H2AX phosphorylation and p21 expression compared to their Atm null counterparts, indicating enhanced p53 and DNA damage responses. Additionally, double knockout splenocytes displayed reduced chromosomal instability compared to Atm null mice. Finally, doubly null mice were partially rescued from infertility defects observed in Atm null mice. These results indicate that inhibition of WIP1 may represent a useful strategy for cancer treatment in general and A-T patients in particular. PMID:21765465
Jung, Won-Gyo; Park, Sang-Sung; Shin, Young-Geun; Jang, Dong-Sik
Because about 83.6 billion won worth coins are not collected annually, 35 billion won of government money is being wasted for producing new coins in Korea. In order to improve unnecessary government money leakage, we now have to develop a proper way of managing small valued money such as coins. We have already developed the coin ATM to solve such problem in the previous study. In this study, we proposed business model, which enables users to deposit or consume such small amount of money with the coin ATM. The proposed business model has advantages that enable to connect various payment system and is efficient to consume such small amount of money. This business model improves not only the way of managing small valued money but also the way of consuming small valued money. Furthermore, our business model can contribute to activating circulation of coins as well as preventing leakage of government money.
Meng Xiangbing; Song Yi; Mao Jianping; Gong Bo; Dong Yan; Liu Bin; Sun Zhixian
Objective: To clone ATM full length cDNA and cDNA fragments containing some functional domains and to identify proteins that interact with ATM and mediate DNA damage signal transduction in cellular response to DNA damage. Methods: ATM cDNA was amplified from MarthomTM-Ready cDNA kit of human leukocytes by LD-PCR. ATM-interacting proteins were screened by yeast two hybrid system. Results: ATM full-length cDNA and cDNA fragments containing PI3K kinase domain, leucine zipper and proline rich region were amplified from human cDNAs. Several candidate clones that interacted with ATM PI3K domain were identified. Conclusion: ATM mediates DNA damage signal transduction by interacting with many proteins
Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others
This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.
Jang, Eun Ryoung; Choi, Jae Duk; Jeong, Gajin; Lee, Jong-Soo
Acetyltransferase, p300 is a transcriptional cofactor of signal-responsive transcriptional regulation. The surveillance kinase ataxia-telangiectasia mutated (ATM) plays a central role in regulation of a wide range of cellular DNA damage responses. Here, we investigated whether and how ATM mediates phosphorylation of p300 in response to DNA damage and how p300 phosphorylation is functionally linked to DNA damage. ATM-phosphorylated p300 in vitro and in vivo, in response to DNA damage. Phosphorylation of p300 proteins was observed upon γ-irradiation in ATM + cells but not ATM - cells. Importantly, expression of nonphosphorylatable serine to alanine form of p300 (S106A) destabilized both p300 and NBS1 proteins, after DNA damage. These data demonstrate that ATM transduces a DNA damage signal to p300, and that ATM-dependent phosphorylation of p300 is required for stabilization of NBS1 proteins in response to DNA damage.
I. Baroňák; M. Vozňák
Connection Admission Control is an element in the of preclusive mechanisms of ATM management. Its main task is to prevent overloading of the network and to ensure the required quality of service. This means that it has to predict the service of the network and according to its state it can manage both existing and new connections. This paper deals with the diffuse method, a CAC method that enables us to obtain the required results.
Full Text Available This paper evaluates feasibility of the new Air Traffic Management (ATM organisation in Functional Airspace Block Central Europe (FAB CE and specifies the implementation scenarios that are proposed by Central European Air Traffic Services Coordination Group (CEATS CG. The paper elaborates elements of required Functional Airspace Block Central Europe implementation and identifies and assesses the implementation blockers. Provision of air navigation services in European Civil Aviation Conference (ECAC area is diversely regulated and highly fragmented.
Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.
Klipp, Emily S.; Nayegandhi, Amar; Brock, John C.; Sallenger, A.H.; Bonisteel, Jamie M.; Yates, Xan; Wright, C. Wayne
These remotely sensed, geographically referenced elevation measurements of lidar-derived first-surface (FS) topography were produced collaboratively by the U.S. Geological Survey (USGS), Florida Integrated Science Center (FISC), St. Petersburg, FL, and the National Aeronautics and Space Administration (NASA), Wallops Flight Facility, VA. This project provides highly detailed and accurate datasets of a portion of the Texas coastline within UTM zone 14, acquired October 12-13, 2001. The datasets are made available for use as a management tool to research scientists and natural-resource managers. An innovative scanning lidar instrument originally developed by NASA, and known as the Airborne Topographic Mapper (ATM), was used during data acquisition. The ATM system is a scanning lidar system that measures high-resolution topography of the land surface and incorporates a green-wavelength laser operating at pulse rates of 2 to 10 kilohertz. Measurements from the laser-ranging device are coupled with data acquired from inertial navigation system (INS) attitude sensors and differentially corrected global positioning system (GPS) receivers to measure topography of the surface at accuracies of +/-15 centimeters. The nominal ATM platform is a Twin Otter or P-3 Orion aircraft, but the instrument may be deployed on a range of light aircraft. Elevation measurements were collected over the survey area using the ATM system, and the resulting data were then processed using the Airborne Lidar Processing System (ALPS), a custom-built processing system developed in a NASA-USGS collaboration. ALPS supports the exploration and processing of lidar data in an interactive or batch mode. Modules for presurvey flight-line definition, flight-path plotting, lidar raster and waveform investigation, and digital camera image playback have been developed. Processing algorithms have been developed to extract the range to the first and last significant return within each waveform. ALPS is used
Yates, Xan; Nayegandhi, Amar; Brock, John C.; Sallenger, A.H.; Bonisteel, Jamie M.; Klipp, Emily S.; Wright, C. Wayne
These remotely sensed, geographically referenced elevation measurements of Lidar-derived first surface (FS) topography were produced collaboratively by the U.S. Geological Survey (USGS), Florida Integrated Science Center (FISC), St. Petersburg, FL, and the National Aeronautics and Space Administration (NASA), Wallops Flight Facility, VA. This project provides highly detailed and accurate datasets of the eastern Florida panhandle coastline, acquired October 2, 2001. The datasets are made available for use as a management tool to research scientists and natural resource managers. An innovative scanning Lidar instrument originally developed by NASA, and known as the Airborne Topographic Mapper (ATM), was used during data acquisition. The ATM system is a scanning Lidar system that measures high-resolution topography of the land surface and incorporates a green-wavelength laser operating at pulse rates of 2 to 10 kilohertz. Measurements from the laser-ranging device are coupled with data acquired from inertial navigation system (INS) attitude sensors and differentially corrected global positioning system (GPS) receivers to measure topography of the surface at accuracies of +/-15 centimeters. The nominal ATM platform is a Twin Otter or P-3 Orion aircraft, but the instrument may be deployed on a range of light aircraft. Elevation measurements were collected over the survey area using the ATM system, and the resulting data were then processed using the Airborne Lidar Processing System (ALPS), a custom-built processing system developed in a NASA-USGS collaboration. ALPS supports the exploration and processing of Lidar data in an interactive or batch mode. Modules for presurvey flight line definition, flight path plotting, Lidar raster and waveform investigation, and digital camera image playback have been developed. Processing algorithms have been developed to extract the range to the first and last significant return within each waveform. ALPS is routinely used to create
Klipp, Emily S.; Nayegandhi, Amar; Brock, John C.; Sallenger, A.H.; Bonisteel, Jamie M.; Yates, Xan; Wright, C. Wayne
These remotely sensed, geographically referenced elevation measurements of lidar-derived first-surface (FS) topography were produced collaboratively by the U.S. Geological Survey (USGS), Florida Integrated Science Center (FISC), St. Petersburg, FL, and the National Aeronautics and Space Administration (NASA), Wallops Flight Facility, VA. This project provides highly detailed and accurate datasets of a portion of the Texas coastline within UTM zone 15, from Matagorda Peninsula to Galveston Island, acquired October 12-13, 2001. The datasets are made available for use as a management tool to research scientists and natural-resource managers. An innovative scanning lidar instrument originally developed by NASA, and known as the Airborne Topographic Mapper (ATM), was used during data acquisition. The ATM system is a scanning lidar system that measures high-resolution topography of the land surface and incorporates a green-wavelength laser operating at pulse rates of 2 to 10 kilohertz. Measurements from the laser-ranging device are coupled with data acquired from inertial navigation system (INS) attitude sensors and differentially corrected global positioning system (GPS) receivers to measure topography of the surface at accuracies of +/-15 centimeters. The nominal ATM platform is a Twin Otter or P-3 Orion aircraft, but the instrument may be deployed on a range of light aircraft. Elevation measurements were collected over the survey area using the ATM system, and the resulting data were then processed using the Airborne Lidar Processing System (ALPS), a custom-built processing system developed in a NASA-USGS collaboration. ALPS supports the exploration and processing of lidar data in an interactive or batch mode. Modules for presurvey flight-line definition, flight-path plotting, lidar raster and waveform investigation, and digital camera image playback have been developed. Processing algorithms have been developed to extract the range to the first and last significant
Yates, Xan; Nayegandhi, Amar; Brock, John C.; Sallenger, A.H.; Bonisteel, Jamie M.; Klipp, Emily S.; Wright, C. Wayne
These remotely sensed, geographically referenced elevation measurements of Lidar-derived first surface (FS) topography were produced collaboratively by the U.S. Geological Survey (USGS), Florida Integrated Science Center (FISC), St. Petersburg, FL, and the National Aeronautics and Space Administration (NASA), Wallops Flight Facility, VA. This project provides highly detailed and accurate datasets of the western Florida panhandle coastline, acquired October 2-4 and 7-10, 2001. The datasets are made available for use as a management tool to research scientists and natural resource managers. An innovative scanning Lidar instrument originally developed by NASA, and known as the Airborne Topographic Mapper (ATM), was used during data acquisition. The ATM system is a scanning Lidar system that measures high-resolution topography of the land surface and incorporates a green-wavelength laser operating at pulse rates of 2 to 10 kilohertz. Measurements from the laser-ranging device are coupled with data acquired from inertial navigation system (INS) attitude sensors and differentially corrected global positioning system (GPS) receivers to measure topography of the surface at accuracies of +/-15 centimeters. The nominal ATM platform is a Twin Otter or P-3 Orion aircraft, but the instrument may be deployed on a range of light aircraft. Elevation measurements were collected over the survey area using the ATM system, and the resulting data were then processed using the Airborne Lidar Processing System (ALPS), a custom-built processing system developed in a NASA-USGS collaboration. ALPS supports the exploration and processing of Lidar data in an interactive or batch mode. Modules for presurvey flight line definition, flight path plotting, Lidar raster and waveform investigation, and digital camera image playback have been developed. Processing algorithms have been developed to extract the range to the first and last significant return within each waveform. ALPS is routinely used
Susmi Routray; A. M. Sherry; B. V. R. Reddy
Mobile and Wireless communication devices are becoming enablers for organizations to conduct business more effectively and efficiently. One of the most effective applications is mobile banking (m-banking). For any application to gain recognition technological advancements play a vital role. To make m-banking application a success bandwidth management is an important issue. The incr eased flexibility and mobility feature of wireless ATM and its bandwidth on demand fu...
Faunce, Thomas A; Urbas, Gregor; Skillen, Lesley
This article critically analyses the prospects for introducing United States anti-fraud (or anti-false claims) laws in the Australian health care setting. Australian governments spend billions of dollars each year on medicines and health care. A recent report estimates that the money lost to corporate fraud in Australia is growing at an annual rate of 7%, but that only a third of the losses are currently being detected. In the US, qui tam provisions - the component of anti-fraud or anti-false claims laws involving payments to whistleblowers - have been particularly successful in providing critical evidence allowing public prosecutors to recover damages for fraud and false claims made by corporations in relation to federal and state health care programs. The US continues to strengthen such anti-fraud measures and to successfully apply them to a widening range of areas involving large public investment. Australia still suffers from the absence of any comprehensive scheme that not only allows treble damages recovery for fraud on the public purse, but crucially supports such actions by providing financial encouragement for whistleblowing corporate insiders to expose evidence of fraud. Potential areas of application could include direct and indirect government expenditure on health care service provision, pharmaceuticals, medical devices, defence, carbon emissions compensation and tobacco-related illness. The creation in Australia of an equivalent to US anti-false claims legislation should be a policy priority, particularly in a period of financial stringency.
Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca
Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.
Bystrický, J; Huet, M; Le Dû, P; Mandjavidze, I D
This paper presents some of the conclusions of our studies on asynchronous transfer mode (ATM) and fast Ethernet in the ATLAS level-2 trigger pilot project. We describe the general concept and principles of our data-collection and event-building scheme that could be transposed to various experiments in high-energy and nuclear physics. To validate the approach in view of ATLAS high-level triggers, we assembled a testbed composed of up to 48 computers linked by a 7.5-Gbit/s ATM switch. This modular switch is used as a single entity or is split into several smaller interconnected switches. This allows study of how to construct a large network from smaller units. Alternatively, the ATM network can be replaced by fast Ethernet. We detail the operation of the system and present series of performance measurements made with event-building traffic pattern. We extrapolate these results to show how today's commercial networking components could be used to build a 1000-port network adequate for ATLAS needs. Lastly, we li...
Dyer, Lisa M; Kepple, Jessica D; Ai, Lingbao; Kim, Wan-Ju; Stanton, Virginia L; Reinhard, Mary K; Backman, Lindsey R F; Streitfeld, W Scott; Babu, Nivetha Ramesh; Treiber, Nicolai; Scharffetter-Kochanek, Karin; McKinnon, Peter J; Brown, Kevin D
ATM activates the NF-κB transcriptional complex in response to genotoxic and oxidative stress. The purpose of this study was to examine if the NF-κB target gene and critical antioxidant SOD2 (MnSOD) in cultured mammary epithelium is also ATM-dependent, and what phenotypes arise from deletion of ATM and SOD2 within the mammary gland. SOD2 expression was studied in human mammary epithelial cells and MCF10A using RNAi to knockdown ATM or the NF-κB subunit RelA. To study ATM and SOD2 function in mammary glands, mouse lines containing Atm or Sod2 genes containing LoxP sites were mated with mice harboring Cre recombinase under the control of the whey acidic protein promoter. Quantitative PCR was used to measure gene expression, and mammary gland structure was studied using histology. SOD2 expression is ATM- and RelA-dependent, ATM knockdown renders cells sensitive to pro-oxidant exposure, and SOD mimetics partially rescue this sensitivity. Mice with germline deletion of Atm fail to develop mature mammary glands, but using a conditional knockout approach, we determined that Atm deletion significantly diminished the expression of Sod2. We also observed that these mice (termed Atm Δ/Δ ) displayed a progressive lactation defect as judged by reduced pup growth rate, aberrant lobulo-alveolar structure, diminished milk protein gene expression, and increased apoptosis within lactating glands. This phenotype appears to be linked to dysregulated Sod2 expression as mammary gland-specific deletion of Sod2 phenocopies defects observed in Atm Δ/Δ dams. We conclude that ATM is required to promote expression of SOD2 within the mammary epithelium, and that both ATM and SOD2 play a crucial role in mammary gland homeostasis.
Gamper, Armin M.; Choi, Serah; Matsumoto, Yoshihiro; Banerjee, Dibyendu; Tomkinson, Alan E.; Bakkenist, Christopher J.
Ataxia telangiectasia (A-T) is a pleiotropic disease, with a characteristic hypersensitivity to ionizing radiation that is caused by biallelic mutations in A-T mutated (ATM), a gene encoding a protein kinase critical for the induction of cellular responses to DNA damage, particularly to DNA double strand breaks. A long known characteristic of A-T cells is their ability to synthesize DNA even in the presence of ionizing radiation-induced DNA damage, a phenomenon termed radioresistant DNA synthesis. We previously reported that ATM kinase inhibition, but not ATM protein disruption, blocks sister chromatid exchange following DNA damage. We now show that ATM kinase inhibition, but not ATM protein disruption, also inhibits DNA synthesis. Investigating a potential physical interaction of ATM with the DNA replication machinery, we found that ATM co-precipitates with proliferating cell nuclear antigen (PCNA) from cellular extracts. Using bacterially purified ATM truncation mutants and in vitro translated PCNA, we showed that the interaction is direct and mediated by the C terminus of ATM. Indeed, a 20-amino acid region close to the kinase domain is sufficient for strong binding to PCNA. This binding is specific to ATM, because the homologous regions of other PIKK members, including the closely related kinase A-T and Rad3-related (ATR), did not bind PCNA. ATM was found to bind two regions in PCNA. To examine the functional significance of the interaction between ATM and PCNA, we tested the ability of ATM to stimulate DNA synthesis by DNA polymerase δ, which is implicated in both DNA replication and DNA repair processes. ATM was observed to stimulate DNA polymerase activity in a PCNA-dependent manner. PMID:22362778
Washington's WNP-2 nuclear plant faces a securities fraud investigation just as it is ready to start operating on schedule. The investigation's outcome and WNP-2's performance will determine whether WNP-1 and WNP-3 will be financed. Angry bondholders who did not receive interest on their investments in January prompted Congressional hearings, at which it was learned that institutional buyers had pulled out of the Washington Public Power Supply System project and unloaded the bonds on thousands of unsuspecting individuals for whom tax-free municipal bonds are inappropriate. Securities Exchange Commission investigators will focus on the initial offering and disclosure by the issuer to determine if the Wall Street unloading was legal
Cozort, L A
A May 2000 U.S. Supreme Court decision determining when a Federal bribery statute can be used to fight Medicare fraud has ramifications for healthcare providers. In Fischer v. United States, the Court concluded that healthcare providers that participate in Medicare are considered to receive benefits as set forth in the bribery statute and thus can be prosecuted for fraudulent activities against the government under the statute. The statute mandates a fine, imprisonment for up to 10 years, or both for anyone convicted under it. Provider organizations that receive Medicare payments and business associates of such organizations should be aware that the government may step up its use of the bribery law in prosecuting fraudulent activity. In addition, although the case pertained specifically to healthcare providers that participate in Medicare, providers that do not participate in Medicare may wish to evaluate the advisability of accepting other Federal funding because of the possible reach of the bribery statute.
Kusumo, A. H.; Chi, C.-F.; Dewi, R. S.
The current study analyzed 125 successful fraud cases happened in Taiwan, China, and Indonesia from 2008 to 2012 published in the English online newspapers. Each of the case report was coded in terms of scam principle, information media (information exchange between fraudsters and victim), money media (media used by fraudsters to obtain unauthorized financial benefit) and other additional information which was judged to be relevant. The Chi-square Automatic Interaction Detector (CHAID) was applied to the coded data of information, scam principle and money media to find a subset of predictors that might derive meaningful classifications. A series of flow diagrams was constructed based on CHAID result to illustrate the flow of information (scam) travelling from information media to money media.
Caldas, Lucas Soares
A fraude é uma prática comum em todo o mundo, sempre envolvendo um agente que usa meios escusos para enganar e obter benefícios à custa de outros. Em grande parte subnotificado devido ao constrangimento social, fraudes são difíceis de prevenir porque mudam rapidamente. No entanto, os processos de influência social por trás deste fenômeno mudam pouco. Pessoas são vítimas de golpes e fraudes contra o consumidor diariamente, no entanto, na maioria dos casos, a vítima poderia ter detectado a frau...
Jiang, Y; Chen, H-C; Su, X; Thompson, P A; Liu, X; Do, K-A; Wierda, W; Keating, M J; Plunkett, W
Approximately 10-20% of chronic lymphocytic leukemia (CLL) patients exhibit del(11q22-23) before treatment, this cohort increases to over 40% upon progression following chemoimmunotherapy. The coding sequence of the DNA damage response gene, ataxia-telangiectasia-mutated (ATM), is contained in this deletion. The residual ATM allele is frequently mutated, suggesting a relationship between gene function and clinical response. To investigate this possibility, we sought to develop and validate an assay for the function of ATM protein in these patients. SMC1 (structural maintenance of chromosomes 1) and KAP1 (KRAB-associated protein 1) were found to be unique substrates of ATM kinase by immunoblot detection following ionizing radiation. Using a pool of eight fluorescence in situ hybridization-negative CLL samples as a standard, the phosphorylation of SMC1 and KAP1 from 46 del (11q22-23) samples was analyzed using normal mixture model-based clustering. This identified 13 samples (28%) that were deficient in ATM function. Targeted sequencing of the ATM gene of these samples, with reference to genomic DNA, revealed 12 somatic mutations and 15 germline mutations in these samples. No strong correlation was observed between ATM mutation and function. Therefore, mutation status may not be taken as an indicator of ATM function. Rather, a direct assay of the kinase activity should be used in the development of therapies.
Adamowicz, Marek; Vermezovic, Jelena; d'Adda di Fagagna, Fabrizio
The DNA damage response (DDR) signal transduction pathway is responsible for sensing DNA damage and further relaying this signal into the cell. ATM is an apical DDR kinase that orchestrates the activation and the recruitment of downstream DDR factors to induce cell-cycle arrest and repair. We have previously shown that NOTCH1 inhibits ATM activation upon DNA damage, but the underlying mechanism remains unclear. Here, we show that NOTCH1 does not impair ATM recruitment to DNA double-strand breaks (DSBs). Rather, NOTCH1 prevents binding of FOXO3a and KAT5/Tip60 to ATM through a mechanism in which NOTCH1 competes with FOXO3a for ATM binding. Lack of FOXO3a binding to ATM leads to the loss of KAT5/Tip60 association with ATM. Moreover, expression of NOTCH1 or depletion of ATM impairs the formation of the FOXO3a-KAT5/Tip60 protein complex. Finally, we show that pharmacological induction of FOXO3a nuclear localization sensitizes NOTCH1-driven cancers to DNA-damage-induced cell death. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.
The Materials Characterization Center Approved Testing Material ATM-1 is a borosilicate glass that incorporates nonradioactive constituents and uranium to represent high-level waste (HLW) resulting from the reprocessing of commercial nuclear reactor fuel. Its composition is based upon the simulated HLW glass type 76-68 to which depleted uranium has been added as UO 2 . Three separate lots of ATM-1 glass have been fabricated, designated ATM-1a, ATM-1b, and ATM-1c. Limited analyses and microstructural evaluations were conducted on each type. Each lot of ATM-1 glass was produced from a feedstock melted in an air atmosphere at between 1150 to 1200 0 C and cast into stress annealed rectangular bars. Bars of ATM-1a were nominally 1.3 x 1.3 x 7.6 cm (approx.36 g each), bars of ATM-1b were nominally 2 x 2.5 x 17.5 cm (approx.190 g each) and bars of ATM-1c were nominally 1.9 x 1.9 x 15 cm (approx.170 g each). Thirteen bars of ATM-1a, 14 bars of ATM-1b, and 6 bars of ATM-1c were produced. Twelve random samples from each of lots ATM-1a, ATM-1b, and ATM-1c were analyzed. The concentrations (except for U and Cs) were obtained by Inductively-Coupled Argon Plasma Atomic Emission Spectroscopy analysis. Cesium analysis was performed by Atomic Absorption Spectroscopy, while uranium was analyzed by Pulsed Laser Fluorometry. X-ray diffraction analysis of four samples indicated that lot ATM-1a had no detectable crystalline phases (<3 wt %), while ATM-1b and ATM-1c contained approx.3 to 5 wt % iron-chrome spinel crystals. These concentrations of secondary spinel component are not considered uncommon. Scanning electron microscopy examination of fracture surfaces revealed only a random, apparently crystalline, second phase (1-10 μm diam) and a random distribution of small voids or bubbles (approx.1 μm nominal diam)
Drosos, Yiannis; Escobar, David; Chiang, Ming-Yi; Roys, Kathryn; Valentine, Virginia; Valentine, Marc B; Rehg, Jerold E; Sahai, Vaibhav; Begley, Lesa A; Ye, Jianming; Paul, Leena; McKinnon, Peter J; Sosa-Pineda, Beatriz
Germline mutations in ATM (encoding the DNA-damage signaling kinase, ataxia-telangiectasia-mutated) increase Familial Pancreatic Cancer (FPC) susceptibility, and ATM somatic mutations have been identified in resected human pancreatic tumors. Here we investigated how Atm contributes to pancreatic cancer by deleting this gene in a murine model of the disease expressing oncogenic Kras (Kras G12D ). We show that partial or total ATM deficiency cooperates with Kras G12D to promote highly metastatic pancreatic cancer. We also reveal that ATM is activated in pancreatic precancerous lesions in the context of DNA damage and cell proliferation, and demonstrate that ATM deficiency leads to persistent DNA damage in both precancerous lesions and primary tumors. Using low passage cultures from primary tumors and liver metastases we show that ATM loss accelerates Kras-induced carcinogenesis without conferring a specific phenotype to pancreatic tumors or changing the status of the tumor suppressors p53, p16 Ink4a and p19 Arf . However, ATM deficiency markedly increases the proportion of chromosomal alterations in pancreatic primary tumors and liver metastases. More importantly, ATM deficiency also renders murine pancreatic tumors highly sensitive to radiation. These and other findings in our study conclusively establish that ATM activity poses a major barrier to oncogenic transformation in the pancreas via maintaining genomic stability.
Raposo-Ferreira, T M M; Bueno, R C; Terra, E M; Avante, M L; Tinucci-Costa, M; Carvalho, M; Cassali, G D; Linde, S D; Rogatto, S R; Laufer-Amorim, R
The ataxia telangiectasia mutated (ATM) gene encodes a protein associated with DNA damage repair and maintenance of genomic integrity. In women, ATM transcript and protein downregulation have been reported in sporadic breast carcinomas, and the absence of ATM protein expression has been associated with poor prognosis. The aim of this study was to evaluate ATM gene and protein expression in canine mammary tumors and their association with clinical outcome. ATM gene and protein expression was evaluated by reverse transcription-quantitative polymerase chain reaction and immunohistochemistry, respectively, in normal mammary gland samples (n = 10), benign mammary tumors (n = 11), nonmetastatic mammary carcinomas (n = 19), and metastatic mammary carcinomas (n = 11). Lower ATM transcript levels were detected in benign mammary tumors and carcinomas compared with normal mammary glands (P = .011). Similarly, lower ATM protein expression was observed in benign tumors (P = .0003), nonmetastatic mammary carcinomas (P ATM gene or protein levels were detected among benign tumors and nonmetastatic and metastatic mammary carcinomas (P > .05). The levels of ATM gene or protein expression were not significantly associated with clinical and pathological features or with survival. Similar to human breast cancer, the data in this study suggest that ATM gene and protein downregulation is involved in canine mammary gland tumorigenesis. © The Author(s) 2016.
Choy, Kay Rui; Watters, Dianne J
Ataxia-telangiectasia (A-T) is characterized by neuronal degeneration, cancer, diabetes, immune deficiency, and increased sensitivity to ionizing radiation. A-T is attributed to the deficiency of the protein kinase coded by the ATM (ataxia-telangiectasia mutated) gene. ATM is a sensor of DNA double-strand breaks (DSBs) and signals to cell cycle checkpoints and the DNA repair machinery. ATM phosphorylates numerous substrates and activates many cell-signaling pathways. There has been considerable debate about whether a defective DNA damage response is causative of the neurological aspects of the disease. In proliferating cells, ATM is localized mainly in the nucleus; however, in postmitotic cells such as neurons, ATM is mostly cytoplasmic. Recent studies reveal an increasing number of roles for ATM in the cytoplasm, including activation by oxidative stress. ATM associates with organelles including mitochondria and peroxisomes, both sources of reactive oxygen species (ROS), which have been implicated in neurodegenerative diseases and aging. ATM is also associated with synaptic vesicles and has a role in regulating cellular homeostasis and autophagy. The cytoplasmic roles of ATM provide a new perspective on the neurodegenerative process in A-T. This review will examine the expanding roles of ATM in cellular homeostasis and relate these functions to the complex A-T phenotype. Developmental Dynamics 247:33-46, 2018. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Zhou, Yi; Lee, Ji-Hoon; Jiang, Wenxia; Crowe, Jennie L; Zha, Shan; Paull, Tanya T
Ataxia-telangiectasia mutated (ATM) regulates the DNA damage response as well as DNA double-strand break repair through homologous recombination. Here we show that ATM is hyperactive when the catalytic subunit of DNA-dependent protein kinase (DNA-PKcs) is chemically inhibited or when the DNA-PKcs gene is deleted in human cells. Pre-incubation of ATM protein with active DNA-PKcs also significantly reduces ATM activity in vitro. We characterize several phosphorylation sites in ATM that are targets of DNA-PKcs and show that phospho-mimetic mutations at these residues significantly inhibit ATM activity and impair ATM signaling upon DNA damage. In contrast, phospho-blocking mutations at one cluster of sites increase the frequency of apoptosis during normal cell growth. DNA-PKcs, which is integral to the non-homologous end joining pathway, thus negatively regulates ATM activity through phosphorylation of ATM. These observations illuminate an important regulatory mechanism for ATM that also controls DNA repair pathway choice. Copyright © 2017 Elsevier Inc. All rights reserved.
The human ATM gene, whose inactivation is responsible for the human disease ataxia telangiectasia is conserved throughout the Eukaryotes and plays an important role in the cellular responses to DNA damage, in particular to DNA double-strand breaks (DSBs). Here we describe the identification of an Arabidopsis thaliana homologue of ATM (AtATM), and the molecular and cytological characterization of plants, hereafter called atm, carrying a disrupting T-DNA insertion in this gene. AtATM covers a 32 kb region on chromosome 3. The AtATM transcript has a complex structure, is 12 kb long and formed by 79 exons. The transcriptional level of AtATM is very low in all the tissues tested, and does not vary after exposure to ionizing radiations (IR). In atm plants, the protein is not detected suggesting the mutants are null. The atm mutants are partially sterile. Aberrant segregation of chromosomes during meiosis I on both male and female sides account for this sterility. However, meiotic recombination frequency is normal. Mutant plants are also hypersensitive to gamma rays and methyl methane sulfonate, but not to UV-B, pointing to a specific defect of atm mutants in the response to DNA DSBs. In plants, ionizing radiations induce a strong, rapid and transient transcriptional activation of genes involved in the cellular response to or the repair of DSBs. This transcriptional regulation of AtRAD51, AtPARP1, atGR1 and AtL1G4 is lost in the atm mutants . The absence of AtRAD51 induction associated with ionizing radiation sensitivity suggest that AtAtm play an important function in DSB repair by homologous recombination. In addition we show that homologous intra-chromosomal recombination frequency is elevated in the mutant comparing to wild-type, with or without gamma irradiation. These results show the implication of AtAtm in the genomic stability. (author)
... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program... the capability of the government to deter and recover losses from false, fictitious or fraudulent...
Rozmita Dewi Yuniarti R
Full Text Available The purpose of this study is to find out how the influence of forensic accountant's experience and professionalism on the quality of audit evidence to reveal fraud. Hypothesis in this research is experience of forensic accountant have positive effect to quality of audit evidence to reveal fraud and professionalism of forensic accountant have positive effect to quality of audit evidence to reveal fraud. The research method used is associative method. While the technique of data analysis using correlation coefficient analysis and coefficient of determination analysis. Quantitative data is the primary data. Primary data in the form of questionnaires collected from forensic accountants at the Representative Board of Finance and Development of West Java Province. The results showed that forensic accountant experience and forensic accountant professionalism positively influence the quality of audit evidence to reveal fraud
Full Text Available A need for greater rigor, which is felt by insurance companies in order to guarantee the fundamental balance of their financial sources, led to intensification of the concerns for preventing and combating fraud. The scope of the controller's mission is variable and its limits are set by the control program which has been established. In assessing the fair price of the caused damage, the essential role of the controller is to put a stop to the fraud and to avoidearly damage coverage.But information is required in order to accomplish this.The predictive analytics, of those processes necessary to prevent and combat fraud, is a way of passing from a retroactive and intuitive process to a proactive one, that is oriented according to the information possessed. Based on this approach, insurance companies can build models, to predict the risk of fraud, in order to reduce their financial-cost impact.
Claudia Lucía Ordóñez
Full Text Available The present article gives information about the findings of the third stage of a research project on academic fraud that has been conducted by the Centro de Investigación y Formación en Educación, CIFE, from the Andes University, Bogotá, with the purpose of developing interventions to fight it. Facing upsetting findings in the first two stages about the frequency of fraudulent behaviors and the reasons given by the students to justify academic fraud, we conducted a detailed qualitative study that analyzes these reasons. From the results we propose a cultural explanation for students' decisions on academic fraud, instead of one that only takes into account factors related to individual moral development. Then we use constructivist learning principles and their possible applications to support the need to fight against academic fraud from pedagogical change.
Full Text Available The objectives of this research is to analyze and provide empirical proves about the influences of dishonesty behavior dan moral competence towards academic fraud of accounting students. The variable used in the research are dishonesty behavior and moral competence. The population of the research is the accounting students from Trisakti University, Bina Nusantara University, and Indonesia Banking School. 242 respondents has been involved as sampels in the research. Data used in the research consist of primary data collected using a questionaire. Multiple regression analysis will be used in the data analysis to test the hypotheses, and the data will be tested using the 20 version of SPSS The result of the test shows us that dishonesty behavior is proven to have an effect on the academic fraud of accounting students. While moral competence has not shown an effect on the academic fraud of accounting students. Key words : Dishonesty Behavior, Moral Competence, Academic Fraud
... familiar with, and adhere to, policies and procedures. To determine whether a Unit meets this standard, OIG... provide training on the elements of successful fraud referrals and receive training on the role and...
The EPA OIG hotline receives complaints of fraud, waste, and abuse in EPA and U.S. Chemical Safety Board programs and operations including mismanagement or violations of law, rules, or regulations by EPA employees or program participants.
Yamamoto, Kenta; Wang, Jiguang; Sprinzen, Lisa; Xu, Jun; Haddock, Christopher J; Li, Chen; Lee, Brian J; Loredan, Denis G; Jiang, Wenxia; Vindigni, Alessandro; Wang, Dong; Rabadan, Raul; Zha, Shan
Missense mutations in ATM kinase, a master regulator of DNA damage responses, are found in many cancers, but their impact on ATM function and implications for cancer therapy are largely unknown. Here we report that 72% of cancer-associated ATM mutations are missense mutations that are enriched around the kinase domain. Expression of kinase-dead ATM (Atm(KD/-)) is more oncogenic than loss of ATM (Atm(-/-)) in mouse models, leading to earlier and more frequent lymphomas with Pten deletions. Kinase-dead ATM protein (Atm-KD), but not loss of ATM (Atm-null), prevents replication-dependent removal of Topo-isomerase I-DNA adducts at the step of strand cleavage, leading to severe genomic instability and hypersensitivity to Topo-isomerase I inhibitors. Correspondingly, Topo-isomerase I inhibitors effectively and preferentially eliminate Atm(KD/-), but not Atm-proficientor Atm(-/-) leukemia in animal models. These findings identify ATM kinase-domain missense mutations as a potent oncogenic event and a biomarker for Topo-isomerase I inhibitor based therapy.
Kanapickienė, Rasa; Grundienė, Živilė
Analysis of financial ratios is one of those simple methods to identify frauds. Theoretical survey revealed that, in scientific literature, financial ratios are analysed in order to designate which ratios of the financial statements are the most sensitive in relation with the motifs of executive managers and employees of companies to commit frauds. Empirical study included the analysis of the following: 1) 40 sets of fraudulent financial statements and 2) 125 sets of non-fraudulent financ...
Smith Rotabi, K.
This report discusses concerns raised by participants of Thematic Area 4 (Force, Fraud and Coercion) of the International Forum on Intercountry Adoption and Global Surrogacy held in August 2014. There has been a significant body of research on intercountry adoption practices over the past 30 years; force, fraud, and coercion have been identified in a small but important component of the literature. However, this knowledge in intercountry adoption has not yet truly bridged into research in glo...
Smith Rotabi, Karen; Cheney, Kristen
textabstractThis report discusses concerns raised by participants of Thematic Area 4 (Force, Fraud and Coercion) of the International Forum on Intercountry Adoption and Global Surrogacy held in August 2014. There has been a significant body of research on intercountry adoption practices over the past 30 years; force, fraud, and coercion have been identified in a small but important component of the literature. However, this knowledge in intercountry adoption has not yet truly bridged into res...
revised is submitted for inclusion in that year’s edition of the manual. In addition, new information can be submitted from SMEs in the field. The...justify the inclusion of additional fraud knowledge competencies into mandatory follow- on training for all individuals selected to fill the role of fraud...committee. Revista Europea de Dirección y Economía de la Empresa [European Journal of Management and Business Economics], 19(3): 89–112, 173
After a long history of electoral fraud, Mexicana entered the 1990s with deep skepticism towardspolitical elections. Subsequent electoral reforma succeeded to bring fraud under control. How did Mexican citizens react to these institutional changes f Did they hibernate under theprotectivecover of un unchanging "culture ofdistrust"? Or did they adapt their expectations to thenew realities? Thearticlesupports the hypothesis ofchange. Analyzing a set of formerly disperse opinwn poli data, it arri...
Rashidian, Arash; Joudaki, Hossein; Vian, Taryn
Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.
Full Text Available BACKGROUND: Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. METHODS: The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. FINDINGS: The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. DISCUSSION: Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.
Brann, C.; Kunkee, D.
The National Polar-orbiting Operational Environmental Satellite System's Advanced Technology Microwave Sounder (ATMS) is planned for flight on the first NPOESS mission (C1) in 2013. The C1 ATMS will be the second instrument of the ATMS series and will provide along with the companion Cross-track Infrared Sounder (CrIS), atmospheric temperature and moisture profiles for NPOESS. The first flight of the ATMS is scheduled in 2010 on the NPOESS Preparatory Project (NPP) satellite, which is an early instrument risk reduction component of the NPOESS mission. This poster will focus on the development of the ATMS for C1 including aspects of the sensor calibration, antenna beam and RF characteristics and scanning. New design aspects of the C1 ATMS, required primarily by parts obsolescence, will also be addressed in this poster.
Full Text Available Ataxia-telangiectasia mutated (ATM kinase is a one of the main guardian of genome stability and plays a central role in the DNA damage response (DDR. The deregulation of these pathways is strongly linked to cancer initiation and progression as well as to the development of therapeutic approaches. These observations, along with reports that identify ATM loss of function as an event that may promote tumor initiation and progression, point to ATM as a bona fide tumor suppressor. The identification of ATM as a positive modulator of several signalling networks that sustain tumorigenesis, including oxidative stress, hypoxia, receptor tyrosine kinase and AKT serine-threonine kinase activation, raise the question of whether ATM function in cancer may be more complex. This review aims to give a complete overview on the work of several labs that links ATM to the control of the balance between cell survival, proliferation and death in cancer.
Stagni, Venturina; Oropallo, Veronica; Fianco, Giulia; Antonelli, Martina; Cinà, Irene; Barilà, Daniela
Ataxia-telangiectasia mutated (ATM) kinase is a one of the main guardian of genome stability and plays a central role in the DNA damage response (DDR). The deregulation of these pathways is strongly linked to cancer initiation and progression as well as to the development of therapeutic approaches. These observations, along with reports that identify ATM loss of function as an event that may promote tumor initiation and progression, point to ATM as a bona fide tumor suppressor. The identification of ATM as a positive modulator of several signalling networks that sustain tumorigenesis, including oxidative stress, hypoxia, receptor tyrosine kinase and AKT serine-threonine kinase activation, raise the question of whether ATM function in cancer may be more complex. This review aims to give a complete overview on the work of several labs that links ATM to the control of the balance between cell survival, proliferation and death in cancer. PMID:24681585
Botts, Nathan E; Horan, Thomas A; Thoms, Brian P
There is an opportunity for personal health record (PHR) systems to play a vital role in fostering health self-management within underserved populations. If properly designed and promoted, it is possible that patients will use PHRs to become more empowered in taking an active role toward managing their health needs. This research examines the potential of a cyberinfrastructure-based PHR to encourage patient activation in health care, while also having population health implications. A multi-phased, iterative research approach was used to design and evaluate a PHR system called HealthATM, which utilizes services from a cloud computing environment. These services were integrated into an ATM-style interface aimed at providing a broad range of health consumers with the ability to manage health conditions and encourage accomplishment of health goals. Evaluation of the PHR included 115 patients who were clients of several free clinics in Los Angeles County. The majority of patients perceived ease of use (74%) and confidence (73%) in using the HealthATM system, and thought they would like to use it frequently (73%). Patients also indicated a belief in being responsible for their own health. However, fewer felt as though they were able to maintain necessary life changes to improve their health. Findings from the field tests suggest that PHRs can be a beneficial health management tool for underserved populations. In order for these types of tools to be effective within safety-net communities, they must be technically accessible and provide meaningful opportunities to increase patient engagement in their health care. Copyright © 2011. Published by Elsevier Inc.
Mu’azu Abdullahi Saulawa
Full Text Available The paper seeks to discuss an overview on the advanced fee fraud offences as well as cybercrime in Nigerian. The aims of the paper focus on discussing the advanced fee fraud under the related provisions of Advanced Fee Fraud Act 2006 on the success of the law in addressing the practices of crimes in relation to information technology. The paper also discusses the cybercrimes in Nigeria with a brief look out on the Cybercrime (Prohibition and Prevention Act 2015. Further, it also aims at examining the application of the law in the fraud offences which raises an issue of the regulatory framework of the cybercrime. The methodology adopted by the paper is doctrinal approach method wherein both primary and secondary sources of data were analysed, particularly the local laws and other relevant documents. The finding of the paper reveals that the relevant section of the in the Advanced Fee Fraud Act that deals with electronic communication has not been invoked. This is because the discussed relevant law under the advanced fee fraud did not in any away deal with cases concerning electronic communication under section 13. The paper recommends that there is a need to strengthen the adequacy of the legal framework on the Cybercrimes so as to checkmate such practices in Nigeria.
Madan Lal BHASIN
Full Text Available Banks are the engines that drive the operations in the financialsector, money markets and growth of an economy. With the rapidly growingbanking industry in India, frauds in banks are also increasing very fast, andfraudsters have started using innovative methods. As part of the study, a questionnaire-basedsurvey was conducted in 2013-14 among 345 bank employees to know theirperception towards bank frauds and evaluate the factors that influence thedegree of their compliance level. This study provides a frank discussion of theattitudes, strategies and technology that specialists will need to combatfrauds in banks. In the modern era, there is “no silver bullet for fraudprotection; the double-edged sword of technology is getting sharper,day-in-day-out.” The use of neural network-based behavior models in real-timehas changed the face of fraud management all over the world. Banks that canleverage advances in technology and analytics to improve fraud prevention willreduce their fraud losses. Recently, forensic accounting has come into limelightdue to rapid increase in financial frauds or white-collar crimes.
Holm, Claus; Langsted, Lars Bo; Seehausen, Jesper
The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit engageme......The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit...... engagements has been widely discussed over the years. In this paper we classify actual cases, where the responsibilities of auditors have been established by the court system and/or by the auditors own professional organizations in Denmark. The dataset includes all publicized cases raised against Danish...... auditors within the time period 1909-2006. The information provided in the cases provides a basis for identifying the actual responsibilities pertaining to fraud during the audit. The overall finding of the historical analysis is that the responsibilities of the auditor in relation to fraud should...
Full Text Available The purpose of this study is to explore the relationship between internal audit effectiveness, internal auditor’s responsibility, training and fraud detection. During the last decade internal auditing has become an integral part of modern businesses since it is capable of detecting errors or offences which lead to fraud. In order to investigate the above relationship, we conducted a survey of companies listed in the Athens Stock Exchange. We used factor analysis to validate the survey instrument and to construct our variables measuring fraud detection, internal audit effectiveness, auditor responsibility and training. We used regression analysis to test for significance between the constructed variables. Our analysis shows that audit effectiveness, auditor responsibility and auditor training affect positively and significantly the detection of fraud. Our results highlight the importance of internal audit in detecting accounting fraud and the need of companies to invest on internal audit processes and training in order to achieve enhanced corporate performance. Finally, our research stresses the importance of internal audit and fraud detection for companies which operate in countries which are in a period of economic crisis.
Holm, Claus; Langsted, Lars Bo; Seehausen, Jesper
The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit engageme......The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit...... engagements has been widely discussed over the years. In this paper we classify actual cases, where the responsibilities of auditors have been established by the court system and/or by the auditors own professional organizations in Denmark. The dataset includes all publicized cases raised against Danish...... auditors within the time period 1909-2006. The information provided in the cases provides a basis for identifying the actual responsibilities pertaining to fraud during the audit. The overall finding of the historical analysis is that the responsibilities of the auditor in relation to fraud should...
This project was a comprehensive research program for developing techniques for improving the performance of Internet protocols over Asynchronous Transfer Mode (ATM) based satellite networks. Among the service categories provided by ATM networks, the most commonly used category for data traffic is the unspecified bit rate (UBR) service. UBR allows sources to send data into the network without any feedback control. The project resulted in the numerous ATM Forum contributions and papers.
Matarese, Francesca; Montefusco, Patrizia; Neves, José; Rocha, André
The objective of this paper is the definition of a new methodology for carrying out security risk assessment in the air traffic management (ATM) domain so as to enhance security awareness and integrate secure and cost-effective design objectives. This process is carried out by modelling the system, identifying the assets, threats and vulnerabilities, prioritizing the threats and proposing cost-effective countermeasures for the weaknesses found. ATM security is concerned with securing ATM a...
Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.
An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...
UDOANYA RAYMOND MANUEL; ANIEKAN OFFIONG
This paper presents the importance of applying queuing theory to the Automated Teller Machine (ATM) using Monte Carlo Simulation in order to determine, control and manage the level of queuing congestion found within the Automated Teller Machine (ATM) centre in Nigeria and also it contains the empirical data analysis of the queuing systems obtained at the Automated Teller Machine (ATM) located within the Bank premises for a period of three (3) months. Monte Carlo Simulation is applied to th...
Weigelt, Britta; Bi, Rui; Kumar, Rahul; Blecua, Pedro; Mandelker, Diana L; Geyer, Felipe C; Pareja, Fresia; James, Paul A; Couch, Fergus J; Eccles, Diana M; Blows, Fiona; Pharoah, Paul; Li, Anqi; Selenica, Pier; Lim, Raymond S; Jayakumaran, Gowtham; Waddell, Nic; Shen, Ronglai; Norton, Larry; Wen, Hannah Y; Powell, Simon N; Riaz, Nadeem; Robson, Mark E; Reis-Filho, Jorge S; Chenevix-Trench, Georgia
Pathogenic germline variants in ataxia-telangiectasia mutated (ATM), a gene that plays a role in DNA damage response and cell cycle checkpoints, confer an increased breast cancer (BC) risk. Here, we investigated the phenotypic characteristics and landscape of somatic genetic alterations in 24 BCs from ATM germline mutation carriers by whole-exome and targeted sequencing. ATM-associated BCs were consistently hormone receptor positive and largely displayed minimal immune infiltrate. Although 79.2% of these tumors exhibited loss of heterozygosity of the ATM wild-type allele, none displayed high activity of mutational signature 3 associated with defective homologous recombination DNA (HRD) repair. No TP53 mutations were found in the ATM-associated BCs. Analysis of an independent data set confirmed that germline ATM variants and TP53 somatic mutations are mutually exclusive. Our findings indicate that ATM-associated BCs often harbor bi-allelic inactivation of ATM, are phenotypically distinct from BRCA1/2-associated BCs, lack HRD-related mutational signatures, and that TP53 and ATM genetic alterations are likely epistatic.
Ivancic, William D.; Bobinsky, Eric A.
Results of 45-Mbps DS3 intermediate-frequency loopback measurements of asynchronous transfer mode (ATM) quality of service parameters (cell error ratio and cell loss ratio) are presented. These tests, which were conducted at the NASA Lewis Research Center in support of satellite-ATM interoperability research, represent initial efforts to quantify the minimum parameters for stringent ATM applications, such as MPEG-1 and MPEG-2 video transmission. Portions of these results were originally presented to the International Telecommunications Union's ITU-R Working Party 4B in February 1996 in support of their Draft Preliminary Recommendation on the Transmission of ATM Traffic via Satellite.
Lee, Ji-Hoon; Mand, Michael R; Kao, Chung-Hsuan; Zhou, Yi; Ryu, Seung W; Richards, Alicia L; Coon, Joshua J; Paull, Tanya T
The protein kinase ATM is a master regulator of the DNA damage response but also responds directly to oxidative stress. Loss of ATM causes ataxia telangiectasia, a neurodegenerative disorder with pleiotropic symptoms that include cerebellar dysfunction, cancer, diabetes, and premature aging. We genetically separated the activation of ATM by DNA damage from that by oxidative stress using separation-of-function mutations. We found that deficient activation of ATM by the Mre11-Rad50-Nbs1 complex and DNA double-strand breaks resulted in loss of cell viability, checkpoint activation, and DNA end resection in response to DNA damage. In contrast, loss of oxidative activation of ATM had minimal effects on DNA damage-related outcomes but blocked ATM-mediated initiation of checkpoint responses after oxidative stress and resulted in deficiencies in mitochondrial function and autophagy. In addition, expression of a variant ATM incapable of activation by oxidative stress resulted in widespread protein aggregation. These results indicate a direct relationship between the mechanism of ATM activation and its effects on cellular metabolism and DNA damage responses in human cells and implicate ATM in the control of protein homeostasis. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.
Daniel, J.A.; Pellegrini, M.; Filsuf, D.
whether the functions of ATM are mediated solely by its kinase activity, we generated two mouse models containing single, catalytically inactivating point mutations in Atm. In this paper, we show that, in contrast to Atm-null mice, both D2899A and Q2740P mutations cause early embryonic lethality in mice......, without displaying dominant-negative interfering activity. Using conditional deletion, we find that the D2899A mutation in adult mice behaves largely similar to Atm-null cells but shows greater deficiency in homologous recombination (HR) as measured by hypersensitivity to poly (adenosine diphosphate...
Takubo, Keiyo; Hirao, Atsushi; Ohmura, Masako; Azuma, Masaki; Arai, Fumio; Nagamatsu, Go; Suda, Toshio
Lifelong spermatogenesis is maintained by coordinated sequential processes including self-renewal of stem cells, proliferation of spermatogonial cells, meiotic division, and spermiogenesis. It has been shown that ataxia telangiectasia-mutated (ATM) is required for meiotic division of the seminiferous tubules. Here, we show that, in addition to its role in meiosis, ATM has a pivotal role in premeiotic germ cell maintenance. ATM is activated in premeiotic spermatogonial cells and the Atm-null testis shows progressive degeneration. In Atm-null testicular cells, differing from bone marrow cells of Atm-null mice, reactive oxygen species-mediated p16 Ink4a activation does not occur in Atm-null premeiotic germ cells, which suggests the involvement of different signaling pathways from bone marrow defects. Although Atm-null bone marrow undergoes p16 Ink4a -mediated cellular senescence program, Atm-null premeiotic germ cells exhibited cell cycle arrest and apoptotic elimination of premeiotic germ cells, which is different from p16 Ink4a -mediated senescence
Full Text Available The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry. The paper is based on a descriptive study which studied digital forensics and cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that fraud detection and prevention tools and technologies would be most effective way of combating e-fraud if they can be utilized. It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application to get more efficient oversight
Mihaela Narcisa Stoicu
Full Text Available Bankruptcy is a legal concept that emerged and developed in the business environment, along with other concepts such as: insolvency, debtor, creditor, etc. Simple bankruptcy or bankruptcy fraud do not have a legal definition, but their analysis cannot be made without considering the legal norms governing the procedure of insolvency. The legal regime applicable to insolvent debtors is of general interest, due to the economic and financial effects manifested upon the business environment, with direct influences on the national economy. The insolvency procedure is regulated by Law 85/2006 and aims to establish a collective procedure for covering the liabilities of insolvent debtors. Insolvency is the state of the debtor's assets that is characterized by lack of available funds for the payment of certain, liquid and exigible debt. Therefore, non-payment of debt on maturity must be the effect of the debtor’s incapacity to pay the debt with the available sums of money, incapacity which must be caused by an external and objective situation, namely the cessation of payments.
Grabbe, Shon R.
This Interface Control Document (ICD) documents the airspace adaptation and air traffic inputs of NASA's Future ATM Concepts and Evaluation Tool (FACET). Its intended audience is the project manager, project team, development team, and stakeholders interested in interfacing with the system. FACET equips Air Traffic Management (ATM) researchers and service providers with a way to explore, develop and evaluate advanced air transportation concepts before they are field-tested and eventually deployed. FACET is a flexible software tool that is capable of quickly generating and analyzing thousands of aircraft trajectories. It provides researchers with a simulation environment for preliminary testing of advanced ATM concepts. Using aircraft performance profiles, airspace models, weather data, and flight schedules, the tool models trajectories for the climb, cruise, and descent phases of flight for each type of aircraft. An advanced graphical interface displays traffic patterns in two and three dimensions, under various current and projected conditions for specific airspace regions or over the entire continental United States. The system is able to simulate a full day's dynamic national airspace system (NAS) operations, model system uncertainty, measure the impact of different decision-makers in the NAS, and provide analysis of the results in graphical form, including sector, airport, fix, and airway usage statistics. NASA researchers test and analyze the system-wide impact of new traffic flow management algorithms under anticipated air traffic growth projections on the nation's air traffic system. In addition to modeling the airspace system for NASA research, FACET has also successfully transitioned into a valuable tool for operational use. Federal Aviation Administration (FAA) traffic flow managers and commercial airline dispatchers have used FACET technology for real-time operations planning. FACET integrates live air traffic data from FAA radar systems and weather data
Mouri, Kazunari; Nacher, Jose C; Akutsu, Tatsuya
After IR stress, DNA double-strand breaks (DSBs) occur and repair proteins (RPs) bind to them, generating DSB-RP complexes (DSBCs), which results in repaired DSBs (RDSBs). In recent experimental studies, it is suggested that the ATM proteins detect these DNA lesions depending on the autophosphorylation of ATM which exists as a dimer before phosphorylation. Interestingly, the ATM proteins can work as a sensor for a small number of DSBs (approximately 18 DSBs in a cell after exposure to IR). Thus the ATM proteins amplify the small input signals based on the phosphorylation of the ATM dimer proteins. The true DSB-detection mechanism depending on ATM autophosphorylation has yet to be clarified. We propose a mathematical model for the detection mechanism of DSBs by ATM. Our model includes both a DSB-repair mechanism and an ATM-phosphorylation mechanism. We model the former mechanism as a stochastic process, and obtain theoretical mean values of DSBs and DSBCs. In the latter mechanism, it is known that ATM autophosphorylates itself, and we find that the autophosphorylation induces bifurcation of the phosphorylated ATM (ATM*). The bifurcation diagram depends on the total concentration of ATM, which makes three types of steady state diagrams of ATM*: monostable, reversible bistable, and irreversible bistable. Bistability exists depending on the Hill coefficient in the equation of ATM autophosphorylation, and it emerges as the total concentration of ATM increases. Combining these two mechanisms, we find that ATM* exhibits switch-like behaviour in the presence of bistability, and the detection time after DNA damage decreases when the total concentration of ATM increases. This work provides a mathematical model that explains the DSB-detection mechanism depending on ATM autophosphorylation. These results indicate that positive auto-regulation works both as a sensor and amplifier of small input signals.
Balestrini, Alessia; Nicolas, Laura; Yang-Lott, Katherine; Guryanova, Olga A; Levine, Ross L; Bassing, Craig H; Chaudhuri, Jayanta; Petrini, John H J
The Mre11 complex (Mre11, Rad50, and Nbs1) occupies a central node of the DNA damage response (DDR) network and is required for ATM activation in response to DNA damage. Hypomorphic alleles of MRE11 and NBS1 confer embryonic lethality in ATM-deficient mice, indicating that the complex exerts ATM-independent functions that are essential when ATM is absent. To delineate those functions, a conditional ATM allele (ATM(flox)) was crossed to hypomorphic NBS1 mutants (Nbs1(ΔB/ΔB) mice). Nbs1(ΔB/ΔB) Atm(-/-) hematopoietic cells derived by crossing to vav(cre) were viable in vivo. Nbs1(ΔB/ΔB) Atm(-/-) (VAV) mice exhibited a pronounced defect in double-strand break repair and completely penetrant early onset lymphomagenesis. In addition to repair defects observed, fragile site instability was noted, indicating that the Mre11 complex promotes genome stability upon replication stress in vivo. The data suggest combined influences of the Mre11 complex on DNA repair, as well as the responses to DNA damage and DNA replication stress. A novel mouse model was developed, by combining a vav(cre)-inducible ATM knockout mouse with an NBS1 hypomorphic mutation, to analyze ATM-independent functions of the Mre11 complex in vivo. These data show that the DNA repair, rather than DDR signaling functions of the complex, is acutely required in the context of ATM deficiency to suppress genome instability and lymphomagenesis. ©2015 American Association for Cancer Research.
Petersen, Lars F; Klimowicz, Alexander C; Otsuka, Shannon; Elegbede, Anifat A; Petrillo, Stephanie K; Williamson, Tyler; Williamson, Chris T; Konno, Mie; Lees-Miller, Susan P; Hao, Desiree; Morris, Don; Magliocco, Anthony M; Bebb, D Gwyn
Ataxia-telangiectasia mutated (ATM) is critical in maintaining genomic integrity. In response to DNA double-strand breaks, ATM phosphorylates downstream proteins involved in cell-cycle checkpoint arrest, DNA repair, and apoptosis. Here we investigate the frequency, and influence of ATM deficiency on outcome, in early-resected non-small cell lung cancer (NSCLC). Tissue microarrays, containing 165 formalin-fixed, paraffin-embedded resected NSCLC tumours from patients diagnosed at the Tom Baker Cancer Centre, Calgary, Canada, between 2003 and 2006, were analyzed for ATM expression using quantitative fluorescence immunohistochemistry. Both malignant cell-specific ATM expression and the ratio of ATM expression within malignant tumour cells compared to that in the surrounding tumour stroma, defined as the ATM expression index (ATM-EI), were measured and correlated with clinical outcome. ATM loss was identified in 21.8% of patients, and was unaffected by clinical pathological variables. Patients with low ATM-EI tumours had worse survival outcomes compared to those with high ATM-EI (p ATM-deficient patients may derive greater benefit from guideline-recommended adjuvant chemotherapy following surgical resection. Taken together, these results indicate that ATM loss seems to be an early event in NSCLC carcinogenesis and is an independent prognostic factor associated with worse survival in stage II/III patients.
Muresan, Ioana Stefania; Frumosu, Flavia Dalia; Khan, Shfaqat Abbas
present both a predicted and observed crustal upliftfor the Jakobshavn glacier using ATM data (Airborne Topographic Mapper) from NASA ATM flights during 1997, 2005 and 2010 supplemented with data provided from continuous Global Positioning System (GPS), measurements made on bedrock between 2005...
Ferrari, S.; Verboven, F.L.; Degryse, H.A.
When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment
Ferrari, S.; Verboven, F.L.; Degryse, H.A.
When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment
Kulinski, Joseph M; Darrah, Eric J; Broniowska, Katarzyna A; Mboko, Wadzanai P; Mounce, Bryan C; Malherbe, Laurent P; Corbett, John A; Gauld, Stephen B; Tarakanova, Vera L
Gammaherpesviruses are cancer-associated pathogens that establish life-long infection in most adults. Insufficiency of Ataxia-Telangiectasia mutated (ATM) kinase leads to a poor control of chronic gammaherpesvirus infection via an unknown mechanism that likely involves a suboptimal antiviral response. In contrast to the phenotype in the intact host, ATM facilitates gammaherpesvirus reactivation and replication in vitro. We hypothesized that ATM mediates both pro- and antiviral activities to regulate chronic gammaherpesvirus infection in an immunocompetent host. To test the proposed proviral activity of ATM in vivo, we generated mice with ATM deficiency limited to myeloid cells. Myeloid-specific ATM deficiency attenuated gammaherpesvirus infection during the establishment of viral latency. The results of our study uncover a proviral role of ATM in the context of gammaherpesvirus infection in vivo and support a model where ATM combines pro- and antiviral functions to facilitate both gammaherpesvirus-specific T cell immune response and viral reactivation in vivo. Copyright © 2015 Elsevier Inc. All rights reserved.
Hirozane, Toru; Tohmonda, Takahide; Yoda, Masaki; Shimoda, Masayuki; Kanai, Yae; Matsumoto, Morio; Morioka, Hideo; Nakamura, Masaya; Horiuchi, Keisuke
Ataxia-telangiectasia mutated (ATM) kinase is a central component involved in the signal transduction of the DNA damage response (DDR) and thus plays a critical role in the maintenance of genomic integrity. Although the primary functions of ATM are associated with the DDR, emerging data suggest that ATM has many additional roles that are not directly related to the DDR, including the regulation of oxidative stress signaling, insulin sensitivity, mitochondrial homeostasis, and lymphocyte development. Patients and mice lacking ATM exhibit growth retardation and lower bone mass; however, the mechanisms underlying the skeletal defects are not fully understood. In the present study, we generated mutant mice in which ATM is specifically inactivated in osteoclasts. The mutant mice did not exhibit apparent developmental defects but showed reduced bone mass due to increased osteoclastic bone resorption. Osteoclasts lacking ATM were more resistant to apoptosis and showed a prolonged lifespan compared to the controls. Notably, the inactivation of ATM in osteoclasts resulted in enhanced NF-κB signaling and an increase in the expression of NF-κB-targeted genes. The present study reveals a novel function for ATM in regulating bone metabolism by suppressing the lifespan of osteoclasts and osteoclast-mediated bone resorption.
Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo
An efficient bandwidth allocation scheme is proposed for supporting intergrated services in wireless ATM networks. These include CBR, VBR amd ABR types of traffic. The proposed scheme is based om A-PRMA for carrying ATM traffic in a dynamic TDMA type access system. It allows mobile users to adjust...
Granados-Jaén, Alba; Angulo-Ibáñez, Maria; Rovira-Clavé, Xavier; Gamez, Celina Paola Vasquez; Soriano, Francesc X; Reina, Manuel; Espel, Enric
Ataxia-telangiectasia mutated (ATM) is a cell cycle checkpoint kinase that upon activation by DNA damage leads to cell cycle arrest and DNA repair or apoptosis. The absence of Atm or the occurrence of loss-of-function mutations in Atm predisposes to tumorigenesis. MAPK7 has been implicated in numerous types of cancer with pro-survival and pro-growth roles in tumor cells, but its functional relation with tumor suppressors is not clear. In this study, we show that absence of MAPK7 delays death due to spontaneous tumor development in Atm-/- mice. Compared with Atm-/- thymocytes, Mapk7-/-Atm-/- thymocytes exhibited an improved response to DNA damage (increased phosphorylation of H2AX) and a restored apoptotic response after treatment of mice with ionizing radiation. These findings define an antagonistic function of ATM and MAPK7 in the thymocyte response to DNA damage, and suggest that the lack of MAPK7 inhibits thymic lymphoma growth in Atm-/- mice by partially restoring the DNA damage response in thymocytes.
Vail, Graham; Cheng, Aifang; Han, Yu Ray; Zhao, Teng; Du, Shengwang; Loy, Michael M T; Herrup, Karl; Plummer, Mark R
Ataxia telangiectasia is a multisystemic disorder that includes a devastating neurodegeneration phenotype. The ATM (ataxia-telangiectasia mutated) protein is well-known for its role in the DNA damage response, yet ATM is also found in association with cytoplasmic vesicular structures: endosomes and lysosomes, as well as neuronal synaptic vesicles. In keeping with this latter association, electrical stimulation of the Schaffer collateral pathway in hippocampal slices from ATM-deficient mice does not elicit normal long-term potentiation (LTP). The current study was undertaken to assess the nature of this deficit. Theta burst-induced LTP was reduced in Atm(-/-) animals, with the reduction most pronounced at burst stimuli that included 6 or greater trains. To assess whether the deficit was associated with a pre- or postsynaptic failure, we analyzed paired-pulse facilitation and found that it too was significantly reduced in Atm(-/-) mice. This indicates a deficit in presynaptic function. As further evidence that these synaptic effects of ATM deficiency were presynaptic, we used stochastic optical reconstruction microscopy. Three-dimensional reconstruction revealed that ATM is significantly more closely associated with Piccolo (a presynaptic marker) than with Homer1 (a postsynaptic marker). These results underline how, in addition to its nuclear functions, ATM plays an important functional role in the neuronal synapse where it participates in the regulation of presynaptic vesicle physiology. Copyright © 2016 the American Physiological Society.
Fraile, Marlon; Ford, Margaret; Gadyatskaya, Olga; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Trujillo-Rasua, Rolando
Securing automated teller machines (ATMs), as critical and complex infrastructure, requires a precise understanding of the associated threats. This paper reports on the application of attack-defense trees to model and analyze the security of ATMs.We capture the most dangerous multi-stage attack
Angele, S.; Romestaing, P.; Moullan, N.; Vuillaume, M.; Chapot, B.; Friesen, M.; Jongmans, W.; Cox, D.G.; Pisani, P.; Gerard, J.P.; Hall, J.
The ATM gene, mutated in the cancer-prone and radiation-sensitive syndrome ataxia-telangiectasia (AT), could predispose to breast cancer (BC) development and adverse radiotherapy responses. Sixteen ATM variants were genotyped in 254 BC cases, 70 of whom were adverse radiotherapy responders (RS-BC),
Setiawati, Lenny; Sugiharto, Toto
Penelitian ini ditujukan untuk menganalisis tingkat kepentingan dan kinerja layananATM Bank Mandiri. Analisis Servqual yang terdiri atas dimensi tangible, realibility,responsiveness, assurance,dan empathy digunakan untuk menganalisis kinerjalayanan ATM. Sementara itu, Customer Satisfaction Index dan ImportancePerformance Analysis yang terdiri atas analisis kuadran dan analisis kesenjangandigunakan untuk menginvestigasi kepuasan pelanggan dan untuk mengidentifikasikandimensi layanan yang kiner...
De laatste jaren is er binnen sociale diensten in Nederland veel aandacht geweest voor een strikt handhavingsbeleid ten aanzien van bijstandsuitkering. Het hanteren van een risicoprofiel is hierbij een veel gebruikte methode. Een risicoprofiel is opgebouwd uit factoren waarvan wordt verwacht dat zij voorspellen of een uitkeringsgerechtigde zich in zal laten met fraude. Bij Sociale Zaken en Werkgelegenheid (SoZaWe in Rotterdam is onderzoek gedaan in hoeverre gegevens die zijn opgeslagen in de bestanden van de dienst in relatie staan met fraude. Daarnaast is een onderzoek gedaan in hoeverre factoren die vanuit een theoretisch standpunt in relatie met fraude zouden kunnen staan tot een verbetering van een risicoprofiel kunnen leiden. Uit de beide onderzoeken blijkt dat de gegevens uit de bestanden van SoZaWe een geringe voorspellende waarde hebben. Deze kan iets verbeterd worden door er factoren aan toe te voegen als de attitude van de klant tegenover fraude en beoordeling van de kansen om gecontroleerd te worden en gepakt te worden voor fraude. Het gebruik van risicoprofielen, waarbij alleen van gegevens uit de bestanden van de Sociale Diensten wordt uitgegegaan moet met de grootst mogelijke terughoudendheid gebeuren.
Full Text Available En años recientes la importancia del control de alimentos, en cuanto a la identificación de sus componentes para evitar fraudes, ha crecido tanto en interés en las organizaciones estatales como en las empresas y en las industrias. La globalización, el aumento de las importaciones y exportaciones, y los tratados de libre comercio han propiciado un mayor intercambio y acceso de los alimentos a nivel mundial; junto con ello los problemas asociados a los fraudes tales como la adulteración, sustitución, la intencionalidad, y falsificación se han incrementado. Por ello, se han reportado varios trabajos asociados al fraude alimentario, donde en la mayoría de ellas se muestran aplicaciones de nuevas técnicas de identificación. Sin embargo, una discusión acerca de los tipos de fraude y su impacto sobre la sociedad, el bioterrorismo y la religión, ha sido poco abordada. Esta revisión se enfoca básicamente en describir los tipos de fraude en alimentos más comunes. Así como, se mencionan las recientes técnicas disponibles para detectar una adulteración en carnes.
Full Text Available The purpose of this research is to examine factors that may affect fraud on financial statements that could encourage the emergence of corruption by management. This research uses banks as an industry sample because the banking industry is highly regulated and should report their financial statement to a central bank. Meanwhile, banks still frequently have fraudulent financial statements. Good corporate governance mechanisms indicated that banks have the capability to detect fraud in financial statements. This research focuses on testing factors that may affect the financial statements fraud which lead to the corruption of management. The data used in this research is financial statement data. Corporate governance mechanisms tested in this study are the number of commissioners, percentage of independent directors, number of commissioners meeting, percentage of largest share ownership, managerial ownership, long tenure of commissioners, and type of auditor. This research found that the number of commissioners and managerial ownership affects management's fraud, while the number of independent directors, the number of commissioners meeting, a long tenure managing director, large share ownership, and the type of auditor has no effect on fraud.
The system of emission trading is a complex composed entity with on the one hand a strong environmental component and on the other hand a financial world that hooked on this instrument. In chapter 2 an introduction is provided to the emission trading system. The subsequent chapters elaborate Types of Fraud (Chapter 3), Powers (Chapter 4), and Instruments (Chapter 5). The report shows that various forms of fraud are occurring in emission trading, such as VAT fraud and identity theft. [Dutch] Het systeem van emissiehandel is een complex samengesteld geheel met aan de ene kant een belangrijke milieucomponent en aan de andere kant een financiele wereld die ingehaakt heeft op dit instrument. In hoofdstuk 2 wordt een introductie gegeven op het systeem van emissiehandel. In de volgende hoofdstukken wordt dieper ingegaan op Fraudevormen (hoofdstuk 3), Bevoegdheden (hoofdstuk 4), en Instrumentarium (hoofdstuk 5). Uit het rapport blijkt dat verschillende vormen van fraude zijn optreden bij de handel in emissierechten, zoals BTW-fraude en identiteitsfraude.
13th conference on metal science, modern materials and technologies (ATM'92) has been held in Popowo near Warsaw, Poland in September 1992. The conference has been divided into 9 sections. There are: Plenary section (7 lectures); Functional materials (12 lectures); Methods of material microstructure shaping (5 lectures and 14 posters); Surface engineering (5 lectures and 27 posters); Composites (5 lectures and 9 posters); Iron alloys A (7 lectures and 8 posters); Iron alloys B (7 lectures and 18 posters); Non-ferrous metal alloys (7 lectures and 11 posters) and Methods for materials research (5 lectures and 23 posters). The new materials preparation, their properties and structure as well as a methods for obtaining a desirable properties of material or their surface have been broadly referred and discussed
Fortner, J.A.; Bates, J.K.; Gerding, T.J.
Waste package assemblies consisting of actinide-doped West Valley ATM-10 reference glass and sensitized 304L stainless steel have been reacted with simulated repository groundwater using the Unsaturated Test Method. Analyses of surface corrosion and reaction products resulting from tests that were terminated at scheduled intervals between 13 and 52 weeks are reported. Analyses reveal complex interactions between the groundwater, the sensitized stainless steel waste form holder, and the glass. Alteration phases form that consist mainly of smectite clay, brockite, and an amorphous thorium iron titanium silicate, the latter two incorporating thorium, uranium, and possibly transuranics. The results from the terminated tests, combined with data from tests that are still ongoing, will help determine the suitability of glass waste forms in the proposed high-level repository at the Yucca Mountain Site
Jiang, Hai; Reinhardt, H Christian; Bartkova, Jirina
commonly used by tumors to bypass early neoplastic checkpoints ultimately determine chemotherapeutic response and generate tumor-specific vulnerabilities that can be exploited with targeted therapies. Specifically, evaluation of the combined status of ATM and p53, two commonly mutated tumor suppressor...... genes, can help to predict the clinical response to genotoxic chemotherapies. We show that in p53-deficient settings, suppression of ATM dramatically sensitizes tumors to DNA-damaging chemotherapy, whereas, conversely, in the presence of functional p53, suppression of ATM or its downstream target Chk2...... actually protects tumors from being killed by genotoxic agents. Furthermore, ATM-deficient cancer cells display strong nononcogene addiction to DNA-PKcs for survival after DNA damage, such that suppression of DNA-PKcs in vivo resensitizes inherently chemoresistant ATM-deficient tumors to genotoxic...
Berger, N Daniel; Stanley, Fintan K T; Moore, Shaun; Goodarzi, Aaron A
Ataxia-telangiectasia mutated (ATM) is a serine/threonine protein kinase with a master regulatory function in the DNA damage response. In this role, ATM commands a complex biochemical network that signals the presence of oxidative DNA damage, including the dangerous DNA double-strand break, and facilitates subsequent repair. Here, we review the current state of knowledge regarding ATM-dependent chromatin remodelling and epigenomic alterations that are required to maintain genomic integrity in the presence of DNA double-strand breaks and/or oxidative stress. We will focus particularly on the roles of ATM in adjusting nucleosome spacing at sites of unresolved DNA double-strand breaks within complex chromatin environments, and the impact of ATM on preserving the health of cells within the mammalian central nervous system.This article is part of the themed issue 'Chromatin modifiers and remodellers in DNA repair and signalling'. © 2017 The Author(s).
Pauklin, Siim; Kristjuhan, Arnold; Maimets, Toivo; Jaks, Viljar
Induction of apoptosis is pivotal for eliminating cells with damaged DNA or deregulated proliferation. We show that tumor suppressor ARF and ATM/ATR kinase pathways cooperate in the induction of apoptosis in response to elevated expression of c-myc, β-catenin or human papilloma virus E7 oncogenes. Overexpression of oncogenes leads to the formation of phosphorylated H2AX foci, induction of Rad51 protein levels and ATM/ATR-dependent phosphorylation of p53. Inhibition of ATM/ATR kinases abolishes both induction of Rad51 and phosphorylation of p53, and remarkably reduces the level of apoptosis induced by co-expression of oncogenes and ARF. However, the induction of apoptosis is downregulated in p53-/- cells and does not depend on activities of ATM/ATR kinases, indicating that efficient induction of apoptosis by oncogene activation depends on coordinated action of ARF and ATM/ATR pathways in the regulation of p53
Kleines, H.; Ziemons, K.; Zwoll, K.
The ATM technology for high speed serial transmission provides a new quality of communication by introducing novel features in a LAN environment, especially support of real time communication, of both LAN and WAN communication and of multimedia streams. In order to evaluate ATM for future DAQ systems and remote control systems as well as for a high speed picture archiving and communications system for medical images, Forschungszentrum Julich has build up a pilot system for the evaluation of ATM and standard low cost multimedia systems. It is a heterogeneous multivendor system containing a variety of switches and desktop solutions, employing different protocol options of ATM. The tests conducted in the pilot system revealed major difficulties regarding stability, interoperability and performance. The paper presents motivations, layout and results of the pilot system. Discussion of results concentrates on performance issues relevant for realistic applications, e.g., connection to a RAID system via NFS over ATM.
Liu, Rui; King, Ashleigh; Hoch, Nicolas C; Chang, Catherine; Kelly, Gemma L; Deans, Andrew J; Heierhorst, Jörg
The ATM kinase plays critical roles in the response to DNA double-strand breaks, and can also be activated by prolonged DNA replication blocks. It has recently been proposed that replication stress-dependent ATM activation is mediated by ASCIZ (also known as ATMIN, ZNF822), an essential developmental transcription factor. In contrast, we show here that ATM activation, and phosphorylation of its substrates KAP1, p53 and H2AX in response to the replication blocking agent aphidicolin was unaffected in both immortalized and primary ASCIZ/ATMIN-deficient murine embryonic fibroblasts compared to control cells. Similar results were also obtained in human ASCIZ/ATMIN-deleted lymphoma cells. The results demonstrate that ASCIZ/ATMIN is dispensable for ATM activation, and contradict the previously reported dependence of ATM on ASCIZ/ATMIN. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.
Waterworth, Wanda M; Footitt, Steven; Bray, Clifford M; Finch-Savage, William E; West, Christopher E
Genome integrity is crucial for cellular survival and the faithful transmission of genetic information. The eukaryotic cellular response to DNA damage is orchestrated by the DNA damage checkpoint kinases ATAXIA TELANGIECTASIA MUTATED (ATM) and ATM AND RAD3-RELATED (ATR). Here we identify important physiological roles for these sensor kinases in control of seed germination. We demonstrate that double-strand breaks (DSBs) are rate-limiting for germination. We identify that desiccation tolerant seeds exhibit a striking transcriptional DSB damage response during germination, indicative of high levels of genotoxic stress, which is induced following maturation drying and quiescence. Mutant atr and atm seeds are highly resistant to aging, establishing ATM and ATR as determinants of seed viability. In response to aging, ATM delays germination, whereas atm mutant seeds germinate with extensive chromosomal abnormalities. This identifies ATM as a major factor that controls germination in aged seeds, integrating progression through germination with surveillance of genome integrity. Mechanistically, ATM functions through control of DNA replication in imbibing seeds. ATM signaling is mediated by transcriptional control of the cell cycle inhibitor SIAMESE-RELATED 5, an essential factor required for the aging-induced delay to germination. In the soil seed bank, seeds exhibit increased transcript levels of ATM and ATR, with changes in dormancy and germination potential modulated by environmental signals, including temperature and soil moisture. Collectively, our findings reveal physiological functions for these sensor kinases in linking genome integrity to germination, thereby influencing seed quality, crucial for plant survival in the natural environment and sustainable crop production.
Cheng, Aifang; Zhao, Teng; Tse, Kai-Hei; Chow, Hei-Man; Cui, Yong; Jiang, Liwen; Du, Shengwang; Loy, Michael M T; Herrup, Karl
ATM (ataxia-telangiectasia mutated) and ATR (ATM and Rad3-related) are large PI3 kinases whose human mutations result in complex syndromes that include a compromised DNA damage response (DDR) and prominent nervous system phenotypes. Both proteins are nuclear-localized in keeping with their DDR functions, yet both are also found in cytoplasm, including on neuronal synaptic vesicles. In ATM- or ATR-deficient neurons, spontaneous vesicle release is reduced, but a drop in ATM or ATR level also slows FM4-64 dye uptake. In keeping with this, both proteins bind to AP-2 complex components as well as to clathrin, suggesting roles in endocytosis and vesicle recycling. The two proteins play complementary roles in the DDR; ATM is engaged in the repair of double-strand breaks, while ATR deals mainly with single-strand damage. Unexpectedly, this complementarity extends to these proteins' synaptic function as well. Superresolution microscopy and coimmunoprecipitation reveal that ATM associates exclusively with excitatory (VGLUT1 + ) vesicles, while ATR associates only with inhibitory (VGAT + ) vesicles. The levels of ATM and ATR respond to each other; when ATM is deficient, ATR levels rise, and vice versa. Finally, blocking NMDA, but not GABA, receptors causes ATM levels to rise while ATR levels respond to GABA, but not NMDA, receptor blockade. Taken together, our data suggest that ATM and ATR are part of the cellular "infrastructure" that maintains the excitatory/inhibitory balance of the nervous system. This idea has important implications for the human diseases resulting from their genetic deficiency.
Xue Lian; Yu Dong; Furusawa, Yoshiya; Cao Jianping; Okayasu, Ryuichi; Fan Saijun
Purpose: Low-dose hyper-radiosensitivity (HRS) and the later appearing radioresistance (termed induced radioresistance [IRR]) was mainly studied in low linear energy transfer (LET) radiation with survival observation. The aim of this study was to find out whether equivalent hypersensitivity occurred in high LET radiation, and the roles of ataxia telangiectasia mutated (ATM) kinase. Methods and Materials: Survival and mutation were measured by clonogenic assay and HPRT mutation assay. ATM Ser1981 activation was detected by Western blotting and immunofluorescent staining. Pretreatment of specific ATM inhibitor (10 μM KU55933) and activator (20 μg/mL chloroquine) before carbon radiation were adopted to explore the involvement of ATM. The roles of ATM were also investigated in its G2/M checkpoint function with histone H3 phosphorylation analysis and flow cytometric assay, and DNA double strand break (DSB) repair function measured using γ-H2AX foci assay. Results: HRS/IRR was observed with survival and mutation in normal human skin fibroblast cells by carbon ions, while impaired in cells with intrinsic ATM deficiency or normal cells modified with specific ATM activator or inhibitor before irradiation. The dose-response pattern of ATM kinase activation was concordant with the transition from HRS to IRR. The ATM-dependent 'early' G2 checkpoint arrest and DNA DSB repair efficiency could explain the difference between HRS and IRR. Conclusions: These data demonstrate that the HRS/IRR by carbon ion radiation is an ATM-dependent phenomenon in the cellular response to DNA damage.
Operational Circular No. 10 entitled “Principles and procedures governing investigation of Fraud”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 4 December 2012 and entering into force on 1 January 2013, is available on the intranet site of the Human Resources Department. This circular is applicable to all persons working at or on behalf of CERN. The purpose of this new operational circular is to specify the definition of fraud and to lay down the Organization’s fraud investigation process pursuant to the CERN Anti-fraud Policy and in accordance with the principles of due process. Department Head Office HR Department
Beumer, Jan H.; Fu, Katherine Y.; Anyang, Bean N.; Siegfried, Jill M.; Bakkenist, Christopher J.
ATM and ATR are kinases implicated in a myriad of DNA-damage responses. ATM kinase inhibition radiosensitizes cells and selectively kills cells with Fanconi anemia (FA) gene mutations. ATR kinase inhibition sensitizes cells to agents that induce replication stress and selectively kills cells with ATM and TP53 mutations. ATM mutations and FANCF promoter-methylation are reported in lung carcinomas. We undertook functional analyses of ATM, ATR, Chk1 and FA proteins in lung cancer cell lines. We included Calu6 that is reported to be FANCL-deficient. In addition, the cancer genome atlas (TCGA) database was interrogated for alterations in: 1) ATM, MRE11A, RAD50 and NBN; 2) ATR, ATRIP and TOPBP1; and 3) 15 FA genes. No defects in ATM, ATR or Chk1 kinase activation, or FANCD2 monoubiquitination were identified in the lung cancer cell lines examined, including Calu6, and major alterations in these pathways were not identified in the TCGA database. Cell lines were radiosensitized by ATM kinase inhibitor KU60019, but no cell killing by ATM kinase inhibitor alone was observed. While no synergy between gemcitabine or carboplatin and ATR kinase inhibitor ETP-46464 was observed, synergy between gemcitabine and Chk1 kinase inhibitor UCN-01 was observed in 54 T, 201 T and H460, and synergy between carboplatin and Chk1 kinase inhibitor was identified in 201 T and 239 T. No interactions between ATM, ATR and FA activation were observed by either ATM or ATR kinase inhibition in the lung cancer cell lines. Analyses of ATM serine 1981 and Chk1 serine 345 phosphorylation, and FANCD2 monoubiquitination revealed that ATM and ATR kinase activation and FA pathway signaling are intact in the lung cancer cell lines examined. As such, these posttranslational modifications may have utility as biomarkers for the integrity of DNA damage signaling pathways in lung cancer. Different sensitization profiles between gemcitabine and carboplatin and ATR kinase inhibitor ETP-46464 and Chk1 kinase inhibitor
Renault, Anne-Laure; Mebirouk, Noura; Fuhrmann, Laetitia; Bataillon, Guillaume; Cavaciuti, Eve; Le Gal, Dorothée; Girard, Elodie; Popova, Tatiana; La Rosa, Philippe; Beauvallet, Juana; Eon-Marchais, Séverine; Dondon, Marie-Gabrielle; d'Enghien, Catherine Dubois; Laugé, Anthony; Chemlali, Walid; Raynal, Virginie; Labbé, Martine; Bièche, Ivan; Baulande, Sylvain; Bay, Jacques-Olivier; Berthet, Pascaline; Caron, Olivier; Buecher, Bruno; Faivre, Laurence; Fresnay, Marc; Gauthier-Villars, Marion; Gesta, Paul; Janin, Nicolas; Lejeune, Sophie; Maugard, Christine; Moutton, Sébastien; Venat-Bouvet, Laurence; Zattara, Hélène; Fricker, Jean-Pierre; Gladieff, Laurence; Coupier, Isabelle; Chenevix-Trench, Georgia; Hall, Janet; Vincent-Salomon, Anne; Stoppa-Lyonnet, Dominique; Andrieu, Nadine; Lesueur, Fabienne
The ataxia telangiectasia mutated (ATM) gene is a moderate-risk breast cancer susceptibility gene; germline loss-of-function variants are found in up to 3% of hereditary breast and ovarian cancer (HBOC) families who undergo genetic testing. So far, no clear histopathological and molecular features of breast tumours occurring in ATM deleterious variant carriers have been described, but identification of an ATM-associated tumour signature may help in patient management. To characterise hallmarks of ATM-associated tumours, we performed systematic pathology review of tumours from 21 participants from ataxia-telangiectasia families and 18 participants from HBOC families, as well as copy number profiling on a subset of 23 tumours. Morphology of ATM-associated tumours was compared with that of 599 patients with no BRCA1 and BRCA2 mutations from a hospital-based series, as well as with data from The Cancer Genome Atlas. Absolute copy number and loss of heterozygosity (LOH) profiles were obtained from the OncoScan SNP array. In addition, we performed whole-genome sequencing on four tumours from ATM loss-of-function variant carriers with available frozen material. We found that ATM-associated tumours belong mostly to the luminal B subtype, are tetraploid and show LOH at the ATM locus at 11q22-23. Unlike tumours in which BRCA1 or BRCA2 is inactivated, tumours arising in ATM deleterious variant carriers are not associated with increased large-scale genomic instability as measured by the large-scale state transitions signature. Losses at 13q14.11-q14.3, 17p13.2-p12, 21p11.2-p11.1 and 22q11.23 were observed. Somatic alterations at these loci may therefore represent biomarkers for ATM testing and harbour driver mutations in potentially 'druggable' genes that would allow patients to be directed towards tailored therapeutic strategies. Although ATM is involved in the DNA damage response, ATM-associated tumours are distinct from BRCA1-associated tumours in terms of morphological
... apply to any debt based in whole or in part on conduct in violation of the antitrust laws or to any debt... antitrust laws or any claim involving fraud, the presentation of a false claim, or misrepresentation on the... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Antitrust, fraud, tax...
Full Text Available This article examines how worldwide governance, global competiveness, and other institutional determinants have influenced the number of accounting fraud cases in several countries. The researchers have focused more closely on the importance of ‘good governance’ as one of the indicators of development objectives in itself. The institutional perspective is employed to explain the complexity of frauds in different societies which can be compatible for the purposes of international judgments in order to increase the effectiveness of previous forensic accounting theories. In this paper, a linear regression model is tested where governance, competitiveness, and other institutional variables are associated with a measure of accounting fraud cases. From our results, we can merely claim that an increased level of controlled corruption and political stability might reduce the number of fraud cases in various countries, while more effective and independent governance services with a higher freedom of expression seemed to increase them. The existence of accounting crimes also appeared to be a suitable proxy of better competitiveness. Anglo-Saxon countries have more stated fraud cases than other countries, attributed, perhaps, to the finest commercial courts with the most professional and least corrupt judges in the world, with centuries of precedent cases and experience in dealing with fraud. Moreover, we believe that a better understanding of fraud detection is a potentially important element in forensic accounting analytics in the success of governance policies to enhance development and reduce the risk of bankruptcies related to the reported fraud cases of enterprises.
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with the clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection...
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in or in connection with... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.1 Fraud in or in connection with transactions in foreign currency subject to the...
... of antitrust laws, or to any debt involving fraud, presentation of a false claim, or... violation or fraud, a false claim, misrepresentation, or other criminal activity or misconduct, the Secretary shall refer the debt to the Office of the Inspector General for review. (3) Upon the determination...
Bouzembrak, Y.; Marvin, H.J.P.
Because food fraud can harm human health and erode consumer trust, it is imperative that it is detected at an early stage. Therefore the aim of this study was to predict the expected food fraud type for imported products for which the product category and country of origin are known in order to
General Accounting Office, Washington, DC. Accounting and Financial Management Div.
At the request of Senator William Roth, Jr., the General Accounting Office (GAO) reviewed Medicare and Medicaid fraud investigations that agency inspectors general referred to the Department of Justice for prosecution to identify characteristics of alleged fraud against the government and to determine actions taken against those caught defrauding…
Been, Henry; van Keulen, Maurice
Fraud risk analysis on data from formal information sources, being a ‘paper reality', suffers from blindness to false information. Moreover, the very act of providing false information is a strong indicator for fraud. The technology presented in this paper provides one step towards the vision of
Full Text Available After a long history of electoral fraud, Mexicana entered the 1990s with deep skepticism towardspolitical elections. Subsequent electoral reforma succeeded to bring fraud under control. How did Mexican citizens react to these institutional changes f Did they hibernate under theprotectivecover of un unchanging "culture ofdistrust"? Or did they adapt their expectations to thenew realities? Thearticlesupports the hypothesis ofchange. Analyzing a set of formerly disperse opinwn poli data, it arrives at an optimisticpicture: Trust in elections has steadily increased since 1988.
La primera de las tres conclusiones de este estudio es que el fraude puede adoptar una amplia gama de formas, desde las violaciones de procedimiento a la ley electoral (con o sin la intención de alterar los resultados) hasta el abierto uso de la violencia en contra de los votantes. Segunda, aun cuando la manipulación del voto es parte integral de la competencia electoral, rara vez desempeña un papel decisivo. En todo caso, el fraude debilita la estabilidad política, ya que puede ser crucial c...
Ponce de León Atria, Macarena
Este artículo busca comprender las complejidades de la competencia electoral por el poder político en Chile en los inicios de su institucionalización. El fraude, sobre todo el cohecho, junto a la rotativa ministerial durante la llamada República Parlamentaria (1891-1925) han sido argumentos recurrentes en la historiografía para probar la crisis política del período. Este artículo cambia el foco sobre el parlamentarismo y el tipo de fraude, e intenta probar que, entre las diversas estrategias ...
Antonius Maria Laot Kian
Full Text Available The aims of the study are to determine the legal arrangements and the application of criminal sanctions against the crime of credit/debit card fraud in Indonesia. The type of study was a normative research by classifying the provisions relevant to the crime of credit/debit card fraud is based on Law No. 11 Year 2008 concerning Information and Electronic Transactions; otherwise it is used also Convention on Cyber crime 2001. Analysis of legal materials made through a law (statue approach to create an ius constituendum regarding the application of criminal sanctions against crime credit/debit card fraud. The results of the research indicated that the legal arrangements and criminal sanctions against the crime of credit/debit card fraud in Indonesia is still relatively minimal. First, not integrated article that directly regulates computer related fraud. Second, not arranged in the form of criminal sanctions for actions that are restitution culprit.
Full Text Available This paper aims to examine the influence of individual morality and internal controls on individuals’ propensity to commit accounting fraud at the local government level. This is a quasi-experimental research paper. Individual morality and internal controls are hypothesized to be having an interaction with each other in influencing the propensity to commit accounting fraud. Individuals who have low levels of moral principles are hypothesized to have the tendency to commit accounting fraud in the absence of any internal controls. To test this, a 2x2 factorial experiment was conducted involving 57 students from the Masters in Economics Development programme at Gadjah Mada University. The result shows that there is an interaction between individual morality and internal controls. The absence of internal controls does not cause an individual with high moral principles to commit accounting fraud. However, individuals with low morality levels tend to commit accounting fraud when internal controls are absent.
Wang, Jufang; Su, Fengtao; Smilenov, Lubomir B; Zhou, Libin; Hu, Wentao; Ding, Nan; Zhou, Guangming
Both epidemiological and experimental studies suggest that heterozygosity for a single gene is linked with tumorigenesis and heterozygosity for two genes increases the risk of tumor incidence. Our previous work has demonstrated that Atm/Brca1 double heterozygosity leads to higher cell transformation rate than single heterozygosity. However, the underlying mechanisms have not been fully understood yet. In the present study, a series of pathways were investigated to clarify the possible mechanisms of increased risk of tumorigenesis in Atm and Brca1 heterozygosity. Wild type cells, Atm or Brca1 single heterozygous cells, and Atm/Brca1 double heterozygous cells were used to investigate DNA damage and repair, cell cycle, micronuclei, and cell transformation after photon irradiation. Remarkable high transformation frequency was confirmed in Atm/Brca1 double heterozygous cells compared to wild type cells. It was observed that delayed DNA damage recognition, disturbed cell cycle checkpoint, incomplete DNA repair, and increased genomic instability were involved in the biological networks. Haploinsufficiency of either ATM or BRCA1 negatively impacts these pathways. The quantity of critical proteins such as ATM and BRCA1 plays an important role in determination of the fate of cells exposed to ionizing radiation and double heterozygosity increases the risk of tumorigenesis. These findings also benefit understanding of the individual susceptibility to tumor initiation
Kato, Hisakazu; Takashima, Seiji; Asano, Yoshihiro; Shintani, Yasunori; Yamazaki, Satoru; Seguchi, Osamu; Yamamoto, Hiroyuki; Nakano, Atsushi; Higo, Shuichiro; Ogai, Akiko; Minamino, Tetsuo; Kitakaze, Masafumi; Hori, Masatsugu
Chemotherapeutic agents to induce DNA damage have been limited to use due to severe side effects of cardiotoxicity. ATM (Ataxia-telangiectasia mutated) is an essential protein kinase in triggering DNA damage responses. However, it is unclear how the ATM-mediated DNA damage responses are involved in the cardiac cell damage. To elucidate these functions in heart, we searched for specific substrates of ATM from mouse heart homogenate. Combining an in vitro phosphorylation following anion-exchange chromatography with purification by reverse-phase high-performance liquid chromatography (HPLC), we successfully identified p32, an ASF/SF2-associated protein, as a novel substrate for ATM. An in vitro kinase assay using recombinant p32 revealed that ATM directly phosphorylated p32. Furthermore, we determined Ser 148 of p32 as an ATM phosphorylation site. Since p32 is known to regulate mRNA splicing and transcription, p32 phosphorylation by ATM might be a new transcriptional regulatory pathway for specific DNA damage responses in heart
Eli Dart; Helen Chen; Jerry Friesen; Jim Brandt; Jim Hutchins; Perry Robertson
During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM is connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.
Full Text Available Abstract Background Both epidemiological and experimental studies suggest that heterozygosity for a single gene is linked with tumorigenesis and heterozygosity for two genes increases the risk of tumor incidence. Our previous work has demonstrated that Atm/Brca1 double heterozygosity leads to higher cell transformation rate than single heterozygosity. However, the underlying mechanisms have not been fully understood yet. In the present study, a series of pathways were investigated to clarify the possible mechanisms of increased risk of tumorigenesis in Atm and Brca1 heterozygosity. Methods Wild type cells, Atm or Brca1 single heterozygous cells, and Atm/Brca1 double heterozygous cells were used to investigate DNA damage and repair, cell cycle, micronuclei, and cell transformation after photon irradiation. Results Remarkable high transformation frequency was confirmed in Atm/Brca1 double heterozygous cells compared to wild type cells. It was observed that delayed DNA damage recognition, disturbed cell cycle checkpoint, incomplete DNA repair, and increased genomic instability were involved in the biological networks. Haploinsufficiency of either ATM or BRCA1 negatively impacts these pathways. Conclusions The quantity of critical proteins such as ATM and BRCA1 plays an important role in determination of the fate of cells exposed to ionizing radiation and double heterozygosity increases the risk of tumorigenesis. These findings also benefit understanding of the individual susceptibility to tumor initiation.
Lin, Zi-Li; Kim, Nam-Hyung
Ataxia-telangiectasia mutated (ATM) is critical for the DNA damage response, cell cycle checkpoints, and apoptosis. Significant effort has focused on elucidating the relationship between ATM and other nuclear signal transducers; however, little is known about the connection between ATM and oocyte meiotic maturation. We investigated the function of ATM in porcine oocytes. ATM was expressed at all stages of oocyte maturation and localized predominantly in the nucleus. Furthermore, the ATM-specific inhibitor KU-55933 blocked porcine oocyte maturation, reducing the percentages of oocytes that underwent germinal vesicle breakdown (GVBD) and first polar body extrusion. KU-55933 also decreased the expression of DNA damage-related genes (breast cancer 1, budding uninhibited by benzimidazoles 1, and P53) and reduced the mRNA and protein levels of AKT and other cell cycle-regulated genes that are predominantly expressed during G2/M phase, including bone morphogenetic protein 15, growth differentiation factor 9, cell division cycle protein 2, cyclinB1, and AKT. KU-55933 treatment decreased the developmental potential of blastocysts following parthenogenetic activation and increased the level of apoptosis. Together, these data suggested that ATM influenced the meiotic and cytoplasmic maturation of porcine oocytes, potentially by decreasing their sensitivity to DNA strand breaks, stimulating the AKT pathway, and/or altering the expression of other maternal genes. © 2015 International Federation for Cell Biology.
Gu, Xueyan; Qi, Yongmei; Feng, Zengxiu; Ma, Lin; Gao, Ke; Zhang, Yingmei
Lead (Pb), a widely distributed environmental pollutant, is known to induce mitochondrial damage as well as autophagy in vitro and in vivo. In this study, we found that Pb could trigger mitophagy in both HEK293 cells and the kidney cortex of male Kunming mice. However, whether ataxia telangiectasis mutated (ATM) which is reported to be linked with PTEN-induced putative kinase 1 (PINK1)/Parkin pathway (a well-characterized mitophagic pathway) participates in the regulation of Pb-induced mitophagy and its exact role remains enigmatic. Our results indicated that Pb activated ATM in vitro and in vivo, and further in vitro studies showed that ATM could co-localize with PINK1 and Parkin in cytosol and interact with PINK1. Knockdown of ATM by siRNA blocked Pb-induced mitophagy even under the circumstance of enhanced accumulation of PINK1 and mitochondrial Parkin. Intriguingly, elevation instead of reduction in phosphorylation level of PINK1 and Parkin was observed in response to ATM knockdown and Pb did not contribute to the further increase of their phosphorylation level, implying that ATM indirectly regulated PINK1/Parkin pathway. These findings reveal a novel mechanism for Pb toxicity and suggest the regulatory importance of ATM in PINK1/Parkin-mediated mitophagy. Copyright © 2018 Elsevier B.V. All rights reserved.
Mandriota, Stefano J.; Valentijn, Linda J.; Lesne, Laurence; Betts, David R.; Marino, Denis; Boudal-Khoshbeen, Mary; London, Wendy B.; Rougemont, Anne-Laure; Attiyeh, Edward F.; Maris, John M.; Hogarty, Michael D.; Koster, Jan; Molenaar, Jan J.; Versteeg, Rogier
Neuroblastoma, a childhood cancer with highly heterogeneous biology and clinical behavior, is characterized by genomic aberrations including amplification of MYCN. Hemizygous deletion of chromosome 11q is a well-established, independent marker of poor prognosis. While 11q22-q23 is the most frequently deleted region, the neuroblastoma tumor suppressor in this region remains to be identified. Chromosome bands 11q22-q23 contain ATM, a cell cycle checkpoint kinase and tumor suppressor playing a pivotal role in the DNA damage response. Here, we report that haploinsufficiency of ATM in neuroblastoma correlates with lower ATM expression, event-free survival, and overall survival. ATM loss occurs in high stage neuroblastoma without MYCN amplification. In SK-N-SH, CLB-Ga and GI-ME-N human neuroblastoma cells, stable ATM silencing promotes neuroblastoma progression in soft agar assays, and in subcutaneous xenografts in nude mice. This effect is dependent on the extent of ATM silencing and does not appear to involve MYCN. Our findings identify ATM as a potential haploinsufficient neuroblastoma tumor suppressor, whose inactivation mirrors the increased aggressiveness associated with 11q deletion in neuroblastoma. PMID:26053094
Daniel, Jeremy A; Pellegrini, Manuela; Lee, Baeck-Seung; Guo, Zhi; Filsuf, Darius; Belkina, Natalya V; You, Zhongsheng; Paull, Tanya T; Sleckman, Barry P; Feigenbaum, Lionel; Nussenzweig, André
Ataxia telangiectasia (A-T) mutated (ATM) is a key deoxyribonucleic acid (DNA) damage signaling kinase that regulates DNA repair, cell cycle checkpoints, and apoptosis. The majority of patients with A-T, a cancer-prone neurodegenerative disease, present with null mutations in Atm. To determine whether the functions of ATM are mediated solely by its kinase activity, we generated two mouse models containing single, catalytically inactivating point mutations in Atm. In this paper, we show that, in contrast to Atm-null mice, both D2899A and Q2740P mutations cause early embryonic lethality in mice, without displaying dominant-negative interfering activity. Using conditional deletion, we find that the D2899A mutation in adult mice behaves largely similar to Atm-null cells but shows greater deficiency in homologous recombination (HR) as measured by hypersensitivity to poly (adenosine diphosphate-ribose) polymerase inhibition and increased genomic instability. These results may explain why missense mutations with no detectable kinase activity are rarely found in patients with classical A-T. We propose that ATM kinase-inactive missense mutations, unless otherwise compensated for, interfere with HR during embryogenesis.
Letheren, M.; Christiansen, J.; Mandjavidze, I.; Verhille, H.; De Prycker, M.; Pauwels, B.; Petit, G.; Wright, S.; Lumley, J.
The very high data rates expected in experiments at the next generation of high luminosity hadron colliders will be handled by pipelined front-end readout electronics and multiple levels (2 or 3) of triggering. A variety of data acquisition architectures have been proposed for use downstream of the first level trigger. Depending on the architecture, the aggregate bandwidths required for event building are expected to be of the order 10--100 Gbit/s. Here, an Asynchronous Transfer Mode (ATM) packet-switching network technology is proposed as the interconnect for building high-performance, scalable data acquisition architectures. This paper introduces the relevant characteristics of ATM and describes components for the construction of an ATM-based event builder: (1) a multi-path, self-routing, scalable ATM switching fabric, (2) an experimental high performance workstation ATM-interface, and (3) a VMEbus ATM-interface. The requirement for traffic shaping in ATM-based event-builders is discussed and an analysis of the performance of several such schemes is presented
Chen Xinping; Zhao Runxiang; Glick, Gloria G.; Cortez, David
The ATM and ATR kinases function at the apex of checkpoint signaling pathways. These kinases share significant sequence similarity, phosphorylate many of the same substrates, and have overlapping roles in initiating cell cycle checkpoints. However, they sense DNA damage through distinct mechanisms. ATR primarily senses single stranded DNA (ssDNA) through its interaction with ATRIP, and ATM senses double strand breaks through its interaction with Nbs1. We determined that the N-terminus of ATR contains a domain that binds ATRIP. Attaching this domain to ATM allowed the fusion protein (ATM*) to bind ATRIP and associate with RPA-coated ssDNA. ATM* also gained the ability to localize efficiently to stalled replication forks as well as double strand breaks. Despite having normal kinase activity when tested in vitro and being phosphorylated on S1981 in vivo, ATM* is defective in checkpoint signaling and does not complement cellular deficiencies in either ATM or ATR. These data indicate that the N-terminus of ATR is sufficient to bind ATRIP and to promote localization to sites of replication stress
Tian Mei; Pan Yan; Liu Jianxiang; Ruan Jianlei; Su Xu
Objective: To investigate 60 Co γ-ray induced damage in lymphocytes and the relationship between doses of 60 Co γ-ray irradiation and the levels of phosphorylated H2AX and ATM. Methods: Cells were irradiated with 60 Co γ-rays in the range of 0-8 Gy. The levels of phosphorylated H2AX and ATM were detected by Western blot and FACScan,respectively. The micronucleus(MN)was analyzed by CB method to evaluate DNA damage. Results: FACScan results showed the dose-effect relationship of γ-H2AX expression were linear.square at 0.5 h post-irradiation to different doses, and the fitting curve was shown as Y=3.96+11.29D-0.45D 2 . The level of phosphorylated ATM (p-ATM) was not changed significantly by using the same method. Western blot showed that p-ATM protein expression was significantly increased after irradiation compared with sham, irradiated group. The MN assay which represented DNA damage was sensitive to different doses. Conclusions: γ-ray irradiation could induce the phosphorylation of H2AX and ATM, which may play an important role in indicating DNA damage. Both of H2AX and ATM have the potential as sensitive biomarker and biodosimeter for radiation damage. (authors)
Kuang, Xianghong; Shen, Jianjun; Wong, Paul K.Y.; Yan, Mingshan
Abnormal thymocyte development with thymic lymphomagenesis inevitably occurs in Atm-/- mice, indicating that ATM plays a pivotal role in regulating postnatal thymocyte development and preventing thymic lymphomagenesis. The mechanism for ATM controls these processes is unclear. We have shown previously that c-Myc, an oncoprotein regulated by the mammalian target of rapamycin (mTOR), is overexpressed in Atm-/- thymocytes. Here, we show that inhibition of mTOR signaling with its specific inhibitor, rapamycin, suppresses normal thymocyte DNA synthesis by downregulating 4EBP1, but not S6K, and that 4EBP1 phosphorylation and cyclin D1 expression are coordinately increased in Atm-/- thymocytes. Administration of rapamycin to Atm-/- mice attenuates elevated phospho-4EBP1, c-Myc and cyclin D1 in their thymocytes, and delays thymic lymphoma development. These results indicate that mTOR downstream effector 4EBP1 is essential for normal thymocyte proliferation, but deregulation of 4EBP1 in Atm deficiency is a major factor driving thymic lymphomagenesis in the animals.
Synthia Madya Kusumawati; Ancella A. Hermawan
Financial statement fraud has cost market participants, including investors, employees, creditors, and pensioners. Capital market participants expect active and vigilant corporate governance to ensure the quality, integrity, and transparency of financial information. Financial statement fraud is a serious threat to market participants’ confidence in published audited financial statements. Financial statement fraud has recently received considerable attention from the business community, accou...
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with... Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.3 Fraud... fraud or deceit upon any person, in, or in connection with (1) an offer to make or the making of, any...
... executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in connection... an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in.... 559, fraud, bribery, or criminal collusion in connection with the disposal of personal property, the...
Full Text Available During meiosis in most sexually reproducing organisms, recombination forms crossovers between homologous maternal and paternal chromosomes and thereby promotes proper chromosome segregation at the first meiotic division. The number and distribution of crossovers are tightly controlled, but the factors that contribute to this control are poorly understood in most organisms, including mammals. Here we provide evidence that the ATM kinase or protein is essential for proper crossover formation in mouse spermatocytes. ATM deficiency causes multiple phenotypes in humans and mice, including gonadal atrophy. Mouse Atm-/- spermatocytes undergo apoptosis at mid-prophase of meiosis I, but Atm(-/- meiotic phenotypes are partially rescued by Spo11 heterozygosity, such that ATM-deficient spermatocytes progress to meiotic metaphase I. Strikingly, Spo11+/-Atm-/- spermatocytes are defective in forming the obligate crossover on the sex chromosomes, even though the XY pair is usually incorporated in a sex body and is transcriptionally inactivated as in normal spermatocytes. The XY crossover defect correlates with the appearance of lagging chromosomes at metaphase I, which may trigger the extensive metaphase apoptosis that is observed in these cells. In addition, control of the number and distribution of crossovers on autosomes appears to be defective in the absence of ATM because there is an increase in the total number of MLH1 foci, which mark the sites of eventual crossover formation, and because interference between MLH1 foci is perturbed. The axes of autosomes exhibit structural defects that correlate with the positions of ongoing recombination. Together, these findings indicate that ATM plays a role in both crossover control and chromosome axis integrity and further suggests that ATM is important for coordinating these features of meiotic chromosome dynamics.
Begam, Nasrin; Jamil, Kaiser; Raju, Suryanarayana G
Background: Breast cancer may be induced by activation of protooncogenes to oncogenes and in many cases inactivation of tumor suppressor genes. Ataxia telangiectasia mutated (ATM) is an important tumor suppressor gene which plays central roles in the maintenance of genomic integrity by activating cell cycle checkpoints and promoting repair of double-strand breaks of DNA. In breast cancer, decrease ATM expression correlates with a poor outcome; however, the molecular mechanisms underlying downregulation are still unclear. Promoter hypermethylation may contribute in downregulation. Hence the present investigation was designed to evaluate promoter methylation and expression of the ATM gene in breast cancer cases, and to determine links with clinical and demographic manifestations, in a South Indian population. Methods: Tumor biopsy samples were collected from 50 pathologically confirmed sporadic breast cancer cases. DNA was isolated from tumor and adjacent non-tumorous regions, and sodium bisulfite conversion and methylation-specific PCR were performed using MS-PCR primers for the ATM promoter region. In addition, ATM mRNA expression was also analyzed for all samples using real-time PCR. Results: Fifty eight percent (58%) of cancer tissue samples showed promoter hypermethylation for the ATM gene, in contrast to only 4.44% of normal tissues (p= 0.0001). Furthermore, ATM promoter methylation was positively associated with age (p = 0.01), tumor size (p=0.045) and advanced stage of disease i.e. stages III and IV (p =0.019). An association between promoter hypermethylation and lower expression of ATM mRNA was also found (p=0.035). Conclusion: We report for the first time that promoter hypermethylation of ATM gene may be useful as a potential new biomarker for breast cancer, especially in the relatively young patients. Creative Commons Attribution License
Romano, Francesco Jacopo; Guadagno, Elia; Solari, Domenico; Borrelli, Giorgio; Pignatiello, Sara; Cappabianca, Paolo; Del Basso De Caro, Marialaura
Glioblastoma is one of the most malignant cancers, with a distinguishing dismal prognosis: surgery followed by chemo- and radiotherapy represents the current standard of care, and chemo- and radioresistance underlie disease recurrence and short overall survival of patients suffering from this malignancy. ATM is a kinase activated by autophosphorylation upon DNA doublestrand breaks arising from errors during replication, byproducts of metabolism, chemotherapy or ionizing radiations; TP53 is one of the most popular tumor suppressor, with a preeminent role in DNA damage response and repair. To study the effects of the immunohistochemical expression of p-ATM and p53 in glioblastoma patients, 21 cases were retrospectively examined. In normal brain tissue, p-ATM was expressed only in neurons; conversely, in tumors cells, the protein showed a variable cytoplasmic expression (score: +,++,+++), with being completely undetectable in three cases. Statistical analysis revealed that high p-ATM score (++/+++) strongly correlated to shorter survival (P = 0.022). No difference in overall survival was registered between p53 normally expressed (NE) and overexpressed (OE) glioblastoma patients (P = 0.669). Survival analysis performed on the results from combined assessment of the two proteins showed that patients with NE p53 /low pATM score had longer overall survival than the NE p53/ high pATM score counterpart. Cox-regression analysis confirmed this finding (HR = 0.025; CI 95% = 0.002-0.284; P = 0.003). Our study outlined the immunohistochemical expression of p-ATM/p53 in glioblastomas and provided data on their possible prognostic/predictive of response role. A "non-oncogene addiction" to ATM for NEp53 glioblastoma could be postulated, strengthening the rationale for development of ATM inhibiting drugs. © 2018 Wiley Periodicals, Inc.
Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo
The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...
Preslikavanje parametara kvaliteta usluga (Quality of Service - QoS) jedan je od bitnih elemenata u koncepciji ATM (Asynchronous Transfer Mode) širokopojasnih mreža. U radu su opisani parametri QoS-a (verovatnoće pogrešnih ramova i ćelija, propusni opseg, kašnjenje ćelija, varijacija kašnjenja) koji se preslikavaju na protokole ATM mreža. Preslikavanje se izvodi između korisničkog i aplikacionog QoS-a, a aplikacioni QoS se preslikava na QoS prenosa i komutacije, odnosno na ATM protokole, tzv....
The broadband integrated services digital network (B-ISDN) is expected to provide high-speed and flexible multimedia applications. Multimedia includes data, graphics, image, voice, and video. Asynchronous transfer mode (ATM) is the adopted transport techniques for B-ISDN and has the potential for providing a more efficient and integrated environment for multimedia. It is believed that most broadband applications will make heavy use of visual information. The prospect of wide spread use of image and video communication has led to interest in coding algorithms for reducing bandwidth requirements and improving image quality. The major results of a study on the bridging of network transmission performance and video coding are: Using two representative video sequences, several video source models are developed. The fitness of these models are validated through the use of statistical tests and network queuing performance. A dual leaky bucket algorithm is proposed as an effective network policing function. The concept of the dual leaky bucket algorithm can be applied to a prioritized coding approach to achieve transmission efficiency. A mapping of the performance/control parameters at the network level into equivalent parameters at the video coding level is developed. Based on that, a complete set of principles for the design of video codecs for network transmission is proposed.
Baxley, Brian T.; Swenson, Harry N.; Prevot, Thomas; Callantine, Todd J.
This paper describes operations and procedures envisioned for NASA s Air Traffic Management (ATM) Technology Demonstration #1 (ATD-1). The ATD-1 Concept of Operations (ConOps) demonstration will integrate three NASA technologies to achieve high throughput, fuel-efficient arrival operations into busy terminal airspace. They are Traffic Management Advisor with Terminal Metering (TMA-TM) for precise time-based schedules to the runway and points within the terminal area, Controller-Managed Spacing (CMS) decision support tools for terminal controllers to better manage aircraft delay using speed control, and Flight deck Interval Management (FIM) avionics and flight crew procedures to conduct airborne spacing operations. The ATD-1 concept provides de-conflicted and efficient operations of multiple arrival streams of aircraft, passing through multiple merge points, from top-of-descent (TOD) to touchdown. It also enables aircraft to conduct Optimized Profile Descents (OPDs) from en route altitude to the runway, using primarily speed control to maintain separation and schedule. The ATD-1 project is currently addressing the challenges of integrating the three technologies, and implantation into an operational environment. Goals of the ATD-1 demonstration include increasing the throughput of high-density airports, reducing controller workload, increasing efficiency of arrival operations and the frequency of trajectory-based operations, and promoting aircraft ADS-B equipage.
Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas
Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.
Feb 4, 2015 ... respect to economic and sanitary issues. ... products with Tsp509I and AluI restriction enzymes. .... specific PCR assay was found to be rapid and cost ... produced specific fragments of about 195 bp for ruminant ... industries. ... Fraud identification in industrial meat ... Application of an indirect ELISA and a.
Full Text Available Using research grants administrators and their clients (academic researchers as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. The results indicate that both research grants administrators (71.4 %, and their clients (73% do not know if UoTx has a fraud and irregularity policy. While only 36% of research grants administrators indicated that they would feel safe reporting deceitful activities, a slight majority (59% of the clients reported same. With regards to the steps to follow to report fraudulent activity, it was noted that while all (100% the research grants administrators noted that they were clueless, ironically an overwhelming majority of their clients indicated otherwise. Notwithstanding, both research grants administrators and their clients (93% and 95% respectively concurred that a fraud prevention policy was necessary for UoTx. The implication is that having phenomenal controls that are not effectively publicized, monitored or worse still overridden by someone are useless.
Full Text Available The objective of this study is to identify and analyze the main correlations and implications offraud and error in the business environment and in the financial scandals occurred in the last decade. Theapproach envisages a synthesis and antithesis of the ideas found on this subject in the specialty literature, ofthe regulations issued by various international bodies. To achieve the established objectives, we used aconstructive methodology to identify criticism, presentations and developed a speech with view to a moreefficient and effective fraud and error risk management. The results of the study show that the major financialscandals and hence the global economic crisis are based largely on fraudulent maneuvers of significantproportions. By using "creative accounting" in fraud and error, famous companies have managed to distortreality for their performance and market position, misleading the users’ perception. This study is a theoreticalhaving implications for a future empirical study.The study contributes to auditing literature diversification inthe field of risk of fraud and error. An additional perspective is gained by addressing the financial crisis andsome famous bankruptcies by way of the financial auditors activity and the fraud and error risk.
Triepels, Ron; Feelders, A.J.; Daniels, Hennie
Deficient visibility in global supply chains causes significant risks for the customs brokerage practices of freight forwarders. One of the risks that freight forwarders face is that shipping documentation might contain document fraud and is used to declare a shipment. Traditional risk controls are
Wang, Shu-Li; Pai, Hao-Ting; Wu, Mei-Fang; Wu, Fan; Li, Chen-Lin
According to the investigations of the U.S. Government Accountability Office (GAO), health insurance fraud has caused an enormous pecuniary loss in the U.S. In Taiwan, in dentistry the problem is getting worse if dentists (authorized entities) file fraudulent claims. Several methods have been developed to solve health insurance fraud; however, these methods are like a rule-based mechanism. Without exploring the behavior patterns, these methods are time-consuming and ineffective; in addition, they are inadequate for managing the fraudulent dentists. Based on social network theory, we develop an evaluation approach to solve the problem of cross-dentist fraud. The trustworthiness score of a dentist is calculated based upon the amount and type of dental operations performed on the same patient and the same tooth by that dentist and other dentists. The simulation provides the following evidence. (1) This specific type of fraud can be identified effectively using our evaluation approach. (2) A retrospective study for the claims is also performed. (3) The proposed method is effective in identifying the fraudulent dentists. We provide a new direction for investigating the genuineness of claims data. If the insurer can detect fraudulent dentists using the traditional method and the proposed method simultaneously, the detection will be more transparent and ultimately reduce the losses caused by fraudulent claims. Copyright © 2016 Elsevier B.V. All rights reserved.
PROF. O. E. OSUAGWU
Sep 1, 2013 ... processes. Fraud is a million dollar business that ... unexpected risks and proactively respond to such . ... task using normal audit procedures . Firstly ... model that emulates a biological system. .... stimulate human decision-making ... Transport Planning", International Journal on Soft Computing (IJSC),.
... initiated unless the State agency has sufficient documentary evidence to substantiate fraud. The final... taken to an ADH or prosecuted without sufficient documentary evidence--which is gathered during the... determined to be not significant and was reviewed by the Office of Management and Budget (OMB) in conformance...
... initiated unless the State agency has sufficient documentary evidence to substantiate fraud. The final... taken to an ADH or prosecuted without sufficient documentary evidence--which is gathered during the... determined to be not significant and was reviewed by the Office of Management and Budget (OMB) in conformance...
..., abuse, and corruption and cooperation with official inquiries. 3c.3 Section 3c.3 Conservation of Power... OF CONDUCT § 3c.3 Reporting fraud, waste, abuse, and corruption and cooperation with official..., abuse, and corruption in Commission programs, including on the part of Commission employees, contractors...
fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase
The 419 codes as business unusual: the advance fee fraud online discourse. A Adogame. Abstract. No Abstract. International Journal of Humanistic Studies Vol. 5 2006: pp. 54-72. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners ...
van Capelleveen, Guido Cornelis; Poel, Mannes; Mueller, Roland; Thornton, Dallas; van Hillegersberg, Jos
Health care insurance fraud is a pressing problem, causing substantial and increasing costs in medical insurance programs. Due to large amounts of claims submitted, estimated at 5 billion per day, review of individual claims or providers is a difficult task. This encourages the employment of
Cristian Baú Dal Magro
Full Text Available Purpose – Red flags are mechanisms that can be used by internal auditors for early detection of possible fraud. In this context, the aim of this study was to identify the relevance credit unions’ internal auditors attribute to red flags in assessing fraud risk. Design/methodology/approach – This article is characterized as descriptive concerning its goals, as a survey as to is procedures, and as quantitative in reference to its approach to the problem. The sample onsists of 51 internal auditors working in Credit Union Centers in southern Brazil. Findings – Results indicate that, in the assessment of fraud risk, internal auditors attribute greater importance to red flags referring to operational activities and internal control procedures. In addition, it is suggested that internal auditors are not impartial concerning their perception of relevance of most of the warning signs of the possibility of fraud. Originality/value – The findings contribute by demonstrating to internal auditors the need for greater attention to the use of red flags as auditing tools.
Edo, Galaxy Samson
Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…
K. Smith Rotabi (Karen); K.E. Cheney (Kristen)
textabstractThis report discusses concerns raised by participants of Thematic Area 4 (Force, Fraud and Coercion) of the International Forum on Intercountry Adoption and Global Surrogacy held in August 2014. There has been a significant body of research on intercountry adoption practices over the
... case-based Reasoning, genetic algorithm and fuzzy logic. Its derivable benefits were x-rayed. It has been concluded that there is need for an IT-driven approach to fraud detection and control as a workable alternative to curb the increase and sophistication of fraudsters. KEYWORD: Data Mining, Artificial Neural Network, ...
J.E. Fisch (Jill); J.B. Gelbach (Jonah); J.M. Klick (Jonathan)
markdownabstractEvent studies have become increasingly important in securities fraud litigation after the Supreme Court’s decision in Halliburton II. Litigants have used event study methodology, which empirically analyzes the relationship between the disclosure of corporate information and the
... 29 Labor 9 2010-07-01 2010-07-01 false Meaning of fraud or dishonesty. 2580.412-9 Section 2580.412-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...
..., the auditor must design the audit to provide reasonable assurance of detecting fraud that is material... UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE (CONTINUED) POLICY ON AUDITS OF RUS BORROWERS RUS Audit... statements, auditors should apply audit procedures specifically directed to ascertaining whether an illegal...
Fissette, Marcia Valentine Maria
The research described in this thesis examined the contribution of text analysis to detecting indications of fraud in the annual reports of companies worldwide. A total of 1,727 annual reports have been collected, of which 402 are of the years and companies in which fraudulent activities took place,
Triepels, Ron; Feelders, A. F.; Daniels, Hennie
Deficient visibility in global supply chains causes significant risks for the customs brokerage practices of freight forwarders. One of the risks that freight forwarders face is that shipping documentation might contain document fraud and is used to declare a shipment. Traditional risk controls are
... schemes that are used to obtain money from these programs and, when appropriate, issues Special Fraud... Dallas TX, LA, AR, OK, NM 214-767-8406 Kansas City MO, ND, SD, MT, KS, IA, CO, NE, 816-426-4000 UT, WY...
Full Text Available -1 Asian Conference on Intelligent Information and Database Systems, 3-5 April 2017, Kanazawa, Japan Increasing the detection of minority class instances in financial statement fraud Stephen Obakeng Moepya1,2(B), Fulufhelo V. Nelwamondo1...
Travaille, Peter; Mueller, Roland; Thornton, Dallas; van Hillegersberg, Jos
It is estimated that between $600 and $850 billion annually is lost to fraud, waste, and abuse in the US healthcare system,with $125 to $175 billion of this due to fraudulent activity (Kelley 2009). Medicaid, a state-run, federally-matchedgovernment program which accounts for roughly one-quarter of
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedures to prevent and detect fraud. 104.71 Section 104.71 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) SEPTEMBER 11TH VICTIM COMPENSATION FUND OF 2001 Measures To Protect the Integrity of the Compensation Program § 104.71 Procedures to...
Full Text Available In this paper an innovative tool is applied for the detection of electoral fraud by analyzing statistical distributions of the official results. With this aim a computational model is developed to describe the dynamics of an electoral campaign that conditions the individuals' political preferences. The agent–based model is built assuming that in a clean process the electoral outcome depends, essentially, on preferences subjected to the influence of social interaction and global information. In contrast, in order to simulate an electoral fraud the model is modified such that the voting behavior of the citizens is manipulated on election–day. The model is calibrated with data form the 2006 Mexican electoral campaign for the presidency, and the presence or absence of fraud is validated using the Kolmogorov–Smirnov test, a non–parametric procedure. With information aggregated at the electoral district level, the simulation model rejects the existence of a large scale fraud where at least 5–6% of the total vote tally is manipulated in favor of a particular candidate.
This study investigated the extent of use of forensic accounting techniques in the detection of fraud in tertiary institutions in Anambra State, Nigeria. One research question guided the study and one null hypothesis was tested. Related literature pertinent to the study was reviewed which exposed the need for the study.
-, č. 420 (2010), s. 1-40 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Grant - others:MŠk(CZ) SVV-2010-261801 Institutional research plan: CEZ:MSM0021620846 Keywords : election * voting * fraud * learning Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp420.pdf
Mills, Whitney L.; Roush, Robert E.; Moye, Jennifer; Kunik, Mark E.; Wilson, Nancy L.; Taffet, George E.; Naik, Aanand D.
Due to age-related factors and illnesses, older adults may become vulnerable to elder investment fraud and financial exploitation (EIFFE). The authors describe the development and preliminary evaluation of an educational program to raise awareness and assist clinicians in identifying older adults at risk. Participants (n = 127) gave high ratings…
Raley, M.; Dean, M.; Clark, B.; Stolz, H.; Home, R.; Chan, M. Y.; Zhong, Q.; Brereton, P.; Frewer, L. J.
Background/Aims Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. Methods A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase “authentic” European products using structural equation modelling. Results Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed ‘risk-relieving’ strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Conclusions Targeted communication of authenticity assurance measures, including; regulations
Kendall, H; Naughton, P; Kuznesof, S; Raley, M; Dean, M; Clark, B; Stolz, H; Home, R; Chan, M Y; Zhong, Q; Brereton, P; Frewer, L J
Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase "authentic" European products using structural equation modelling. Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed 'risk-relieving' strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by
With Asynchronous Transfer Mode (ATM), we are experiencing the emergence of a network technology that has the potential of satisfying the requirement for a worldwide standard to allow interoperability of information, regardless...