WorldWideScience

Sample records for program fraud civil

  1. 32 CFR 516.68 - Program Fraud Civil Remedies Act (PFCRA).

    Science.gov (United States)

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.68 Program... the capability of the government to deter and recover losses from false, fictitious or fraudulent...

  2. Determinants of Accounting Frauds:Perceptions of Indonesian Civil Servants

    Directory of Open Access Journals (Sweden)

    Hadri Kusuma

    2017-10-01

    Full Text Available This study aimed to examine a number of factors that affect the accounting fraud. This study used the variables consisting of information asymmetry, organizational commitment and individual morality. Theauthors study surveyed the employees at the Office for Management of Regional Revenue, Finance and Assets (Dinas Pendapatan Pengelolaan Keuangan Aset, Yogyakarta Province. This study uses convenience sampling technique method. The data from 96 respondents revealed that the variables of information asymmetry and organizational commitment significantly enhanced the accounting fraud while the individual morality significantly diminished the accounting fraud.

  3. Reducing Error, Fraud and Corruption (EFC) in Social Protection Programs

    OpenAIRE

    Tesliuc, Emil Daniel; Milazzo, Annamaria

    2007-01-01

    Social Protection (SP) and Social Safety Net (SSN) programs channel a large amount of public resources, it is important to make sure that these reach the intended beneficiaries. Error, fraud, or corruption (EFC) reduces the economic efficiency of these interventions by decreasing the amount of money that goes to the intended beneficiaries, and erodes the political support for the program. ...

  4. Responsabilidad civil contractual por fraudes con tarjeta de crédito en Colombia

    OpenAIRE

    Rendón Vera, José Santiago

    2007-01-01

    La presente monografía de grado es el fruto de la convergencia de los diferentes conocimientos adquiridos en el pregrado de Derecho aplicados a una problemática especial: la responsabilidad civil por los fraudes cometidos con tarjetas de crédito en Colombia. En efecto, el sistema de tarjeta de crédito se inserta dentro de las nuevas formas de contratación que ha traído consigo la modernidad, su uso es relativamente reciente y siempre objeto de constante desarrollo.

  5. Medicare and state health care programs: fraud and abuse, civil money penalties and intermediate sanctions for certain violations by health maintenance organizations and competitive medical plans--HHS. Final rule.

    Science.gov (United States)

    1994-07-15

    This final rule implements sections 9312(c)(2), 9312(f), and 9434(b) of Public Law 99-509, section 7 of Public Law 100-93, section 4014 of Public Law 100-203, sections 224 and 411(k)(12) of Public Law 100-360, and section 6411(d)(3) of Public Law 101-239. These provisions broaden the Secretary's authority to impose intermediate sanctions and civil money penalties on health maintenance organizations (HMOs), competitive medical plans, and other prepaid health plans contracting under Medicare or Medicaid that (1) substantially fail to provide an enrolled individual with required medically necessary items and services; (2) engage in certain marketing, enrollment, reporting, or claims payment abuses; or (3) in the case of Medicare risk-contracting plans, employ or contract with, either directly or indirectly, an individual or entity excluded from participation in Medicare. The provisions also condition Federal financial participation in certain State payments on the State's exclusion of certain prohibited entities from participation in HMO contracts and waiver programs. This final rule is intended to significantly enhance the protections for Medicare beneficiaries and Medicaid recipients enrolled in a HMO, competitive medical plan, or other contracting organization under titles XVIII and XIX of the Social Security Act.

  6. Civil Engineering Technology Program Guide.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This program guide presents civil engineering technology curriculum for technical institutes in Georgia. The general information section contains the following: purpose and objectives; program description, including admissions, typical job titles, and accreditation and certification; and curriculum model, including standard curriculum sequence and…

  7. Construction fraud

    NARCIS (Netherlands)

    Graafland, J.J.; Liedekerke, L.; Dubbink, W.; van Liedekerke, L.; van Luijk, H.

    2011-01-01

    Due to the actions of a whistleblower The Netherlands was confronted with a massive case of construction fraud involving almost the entire construction sector. Price fixing, prior consulting, duplicate accounts, fictitious invoices and active corruption of civil servants were rampant practices. This

  8. 32 CFR Appendix to Part 277 - Program Fraud Civil Remedies

    Science.gov (United States)

    2010-07-01

    ... this appendix. B. Definitions 1. Adequate Evidence Information sufficient to support the reasonable... statements, anything of value, including but not limited to any advantage, preference, privilege, license....C., chapter 33, pursuant to the competitive examination process applicable to administrative law...

  9. Identifying Procurement Fraud in Defense Agencies: An Analysis of the Government Purchase Card Program

    Science.gov (United States)

    2011-04-30

    fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase

  10. Electronic Fraud Detection in the U.S. Medicaid Healthcare Program: Lessons Learned from other Industries

    NARCIS (Netherlands)

    Travaille, Peter; Mueller, Roland; Thornton, Dallas; van Hillegersberg, Jos

    2011-01-01

    It is estimated that between $600 and $850 billion annually is lost to fraud, waste, and abuse in the US healthcare system,with $125 to $175 billion of this due to fraudulent activity (Kelley 2009). Medicaid, a state-run, federally-matchedgovernment program which accounts for roughly one-quarter of

  11. An Educational Program to Assist Clinicians in Identifying Elder Investment Fraud and Financial Exploitation

    Science.gov (United States)

    Mills, Whitney L.; Roush, Robert E.; Moye, Jennifer; Kunik, Mark E.; Wilson, Nancy L.; Taffet, George E.; Naik, Aanand D.

    2012-01-01

    Due to age-related factors and illnesses, older adults may become vulnerable to elder investment fraud and financial exploitation (EIFFE). The authors describe the development and preliminary evaluation of an educational program to raise awareness and assist clinicians in identifying older adults at risk. Participants (n = 127) gave high ratings…

  12. Wine fraud

    OpenAIRE

    Holmberg, Lars

    2010-01-01

    Lars HolmbergFaculty of Law, University of Copenhagen, Copenhagen, DenmarkAbstract: Wine fraud may take several forms, of which two are discussed here: consumption fraud aimed at the wine market in general, and collector fraud aimed at the very top of the wine market. Examples of wine fraud past and present are given, and a suggestion about the extent of contemporary consumer fraud in Europe is provided. Technological possibilities for future detection and prevention of both forms of wine fra...

  13. Wine fraud

    Directory of Open Access Journals (Sweden)

    Lars Holmberg

    2010-10-01

    Full Text Available Lars HolmbergFaculty of Law, University of Copenhagen, Copenhagen, DenmarkAbstract: Wine fraud may take several forms, of which two are discussed here: consumption fraud aimed at the wine market in general, and collector fraud aimed at the very top of the wine market. Examples of wine fraud past and present are given, and a suggestion about the extent of contemporary consumer fraud in Europe is provided. Technological possibilities for future detection and prevention of both forms of wine fraud are discussed.Keywords: adulteration, counterfeit, detection

  14. Health Fraud

    Science.gov (United States)

    Health fraud involves selling drugs, devices, foods, or cosmetics that have not been proven effective. Keep in ... you from getting the treatment you really need. Health fraud scams can be found everywhere, promising help ...

  15. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  16. HOW TO PREVENT FRAUD?

    Directory of Open Access Journals (Sweden)

    Ionela – Corina Chersan

    2009-09-01

    Full Text Available Fraud can range from minor employee theft and unproductive behavior tomisappropriation of assets and fraudulent financial reporting. The risk of fraud can be reduced through a combination of prevention and detection measures. Moreover, prevention and deterrence measures are much less costly than the time and expense required for fraud detection and investigation. The information presented in this document generally is applicable to entities of all sizes. However, the degree to which certain programs and controls are applied in smaller, less-complex entities and the formality of theirapplication are likely to differ from larger organizations.

  17. McGill's Integrated Civil and Common Law Program.

    Science.gov (United States)

    Morissette, Yves-Marie

    2002-01-01

    Describes the bijural program of McGill University Faculty of Law. The program educates all first-degree law students in both the common law and civil law traditions, preparing them for the increasing globalization of legal practice. (EV)

  18. 6 CFR 13.43 - Collection of civil penalties and assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Collection of civil penalties and assessments. 13.43 Section 13.43 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.43 Collection of civil penalties and assessments. Sections 3806 and 3808...

  19. 6 CFR 13.3 - Basis for civil penalties and assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Basis for civil penalties and assessments. 13.3 Section 13.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.3 Basis for civil penalties and assessments. (a) Claims. (1) Except as provided in...

  20. 78 FR 65515 - Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations...

    Science.gov (United States)

    2013-11-01

    ... initiated unless the State agency has sufficient documentary evidence to substantiate fraud. The final... taken to an ADH or prosecuted without sufficient documentary evidence--which is gathered during the... determined to be not significant and was reviewed by the Office of Management and Budget (OMB) in conformance...

  1. 78 FR 51649 - Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations

    Science.gov (United States)

    2013-08-21

    ... initiated unless the State agency has sufficient documentary evidence to substantiate fraud. The final... taken to an ADH or prosecuted without sufficient documentary evidence--which is gathered during the... determined to be not significant and was reviewed by the Office of Management and Budget (OMB) in conformance...

  2. EL ERROR INDUCIDO POR DOLO COMO CAUSAL DE NULIDAD DEL MATRIMONIO CIVIL EN LA LEY No. 19.947: ACEPTACIÓN Y CONSECUENCIAS DE SU REGULACIÓN Error induced by fraud as a ground for nullity of civil marriage under the chilean act 19.947: rationale and consequences of its regulation

    Directory of Open Access Journals (Sweden)

    Alexis Mondaca Miranda

    2010-01-01

    Full Text Available En esta investigación se estudia el error inducido por dolo como vicio de la voluntad en el matrimonio. Luego de analizar la disciplina del error durante la vigencia de la Ley de Matrimonio Civil de i884, se explica la no relevancia de una regulación expresa del error doloso, para finalmente referirnos a los requisitos y a las consecuencias del error producido por dolo como origen de la falta de un libre y espontáneo consentimiento matrimonial.This paper analyses the error induced by fraud of one party as a defect of the spouse's will in marriage. After a [broad] explanation of the error regime under the Civil Marriage Act of 1884, the author demonstrates the irrelevance of the [current] absence of regulation for error. Finally the investigation is focused on requirements and consequences of the misrepresentation causedby fraud as a ground of the lack of marital consent.

  3. Medicare and Social Security: fraud and abuse; civil money penalties for misuse of certain terms, symbols and emblems--HHS. Final rule.

    Science.gov (United States)

    1991-08-28

    This final rule implements section 428(a) of Public Law 100-360 which authorizes the imposition of civil money penalties for the use--in advertising, solicitations or other communications--of certain words, letters, symbols or emblems associated with the Department of Health and Human Services' Social Security and Medicare programs in a manner that the user knows, or should know, would convey a false impression that (1) the communicated item was approved, endorsed or authorized by the Department or its programs, or (2) the responsible person or organization has some connection with, or authorization from, the Department or these programs. This rulemaking is designed to assist in protecting citizens from misrepresentations concerning the services offered and programs administered by the Social Security Administration and the Health Care Financing Administration.

  4. Food Assistance: Efforts To Control Fraud and Abuse in the Child and Adult Care Food Program Should Be Strengthened. United States General Accounting Office Report to Congressional Committees.

    Science.gov (United States)

    Robertson, Robert E.

    The Child and Adult Care Food Program provides over $1.5 billion in benefits annually to children and adults in day care. In order to address the longstanding problems of fraud and abuse present in the program, state agencies have been charged with the responsibility for implementing Food and Nutrition Service's (FNS) regulations to prevent and…

  5. Strong Internal Controls at Service Delivery Level Will Help Prevent CETA-Type Fraud and Abuse in Job Training Partnership Act Programs. Report to Senator Sam Nunn, Ranking Minority Member, Permanent Subcommittee on Investigations, Senate Committee on Governmental Affairs.

    Science.gov (United States)

    General Accounting Office, Washington, DC.

    The Government Accounting Office (GAO) conducted an examination of patterns and causes of fraud in Comprehensive Employment and Training Act (CETA) programs to determine how implementation of Job Training Partnership Act (JTPA) programs might be made less vulnerable to exploitation. GAO's investigation found that fraud and abuse in CETA programs…

  6. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 4. Warning, Emergency Operations, and Support Programs.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    The need for, and a description of, emergency functions required to save lives and protect property in nuclear or natural disasters are presented. Topics discussed include: (1) The Civil Defense Warning System, (2) Introduction to the Emergency Operations Program, (3) Five subprograms of the Emergency Operations Program, (4) Emergency Operations…

  7. 45 CFR 235.110 - Fraud.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Fraud. 235.110 Section 235.110 Public Welfare... PROGRAMS § 235.110 Fraud. State plan requirements: A State plan under title I, IV-A, X, XIV, or XVI of the Social Security Act must provide: (a) That the State agency will establish and maintain: (1) Methods and...

  8. CDIO Projects in Civil Engineering Study Program at DTU

    DEFF Research Database (Denmark)

    Krogsbøll, Anette; Simonsen, Claus; Christensen, Jørgen Erik

    2011-01-01

    or a design build project on each of the first four semesters. In this paper the four projects in the civil engineering study program are described along with a brief description of the entire study program. The aim is to provide additional information and documentation to accompany an exposition where......In 2008 all Bachelor of engineering study programs at the Technical University of Denmark (DTU) have been adopted to the “Conceive – Design – Implement – Operate” approach. As part of the necessary changes it was decided that all seven study programs should have a cross disciplinary project...... students present their projects. Learning outcomes, training and assessment of personal, professional and social engineering skills are described from a project point of view. Progression of engineering skills is discussed from a study program perspective. The interrelation between the various elements...

  9. National Health Care Anti-Fraud Association

    Science.gov (United States)

    ... a Glance Pre-Conference Programs Conference Sessions Registration Hotel & Travel Information Conference Tracks Credit Opportunities Anti-Fraud Expo Sponsors Programs Budget Adequately for 2018 Trainings NETS Webinars Launch Webinar ...

  10. 78 FR 75304 - Medicare Program; Medicare Secondary Payer and Certain Civil Money Penalties

    Science.gov (United States)

    2013-12-11

    ... [CMS-6061-ANPRM] RIN 0938-AR88 Medicare Program; Medicare Secondary Payer and Certain Civil Money... practices for which civil money penalties (CMPs) may or may not be imposed for failure to comply with...-3951. I. Background A. Imposition of Civil Money Penalties (CMPs) In 1981, the Congress added section...

  11. 49 CFR 1540.103 - Fraud and intentional falsification of records.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Responsibilities of Passengers and Other Individuals and Persons § 1540.103 Fraud... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...

  12. Predicting Healthcare Fraud in Medicaid: A Multidimensional Data Model and Analysis Techniques for Fraud Detection

    NARCIS (Netherlands)

    Thornton, Dallas; Mueller, Roland; Schoutsen, Paulus; van Hillegersberg, Jos

    2013-01-01

    It is estimated that approximately $700 billion is lost due to fraud, waste, and abuse in the US healthcare system. Medicaid has been particularly susceptible target for fraud in recent years, with a distributed management model, limited cross- program communications, and a difficult-to-track

  13. Fraud detection tools

    Directory of Open Access Journals (Sweden)

    Katerina Hawlova

    2013-10-01

    Full Text Available This article aims to introduce to readers the topic of fraud management – detection of fraudulent behaviour. The article is divided into two parts. The first part presents what is meant by fraud and fraudulent behaviour. In the second part a case study dealing with fraudulent behaviour detection in the procurement area is introduced.

  14. Avoiding Service Station Fraud.

    Science.gov (United States)

    Burton, Grace M.; Burton, John R.

    1982-01-01

    High school students are warned against service station fraud. A problem-solving section is designed to help students calculate consumer costs for various fraudulent transactions. Several ways of reducing fraud or of lessening the chances of problems are noted. (MP)

  15. High-speed civil transport issues and technology program

    Science.gov (United States)

    Hewett, Marle D.

    1992-01-01

    A strawman program plan is presented, consisting of technology developments and demonstrations required to support the construction of a high-speed civil transport. The plan includes a compilation of technology issues related to the development of a transport. The issues represent technical areas in which research and development are required to allow airframe manufacturers to pursue an HSCT development. The vast majority of technical issues presented require flight demonstrated and validated solutions before a transport development will be undertaken by the industry. The author believes that NASA is the agency best suited to address flight demonstration issues in a concentrated effort. The new Integrated Test Facility at NASA Dryden Flight Research Facility is considered ideally suited to the task of supporting ground validations of proof-of-concept and prototype system demonstrations before night demonstrations. An elaborate ground hardware-in-the-loop (iron bird) simulation supported in this facility provides a viable alternative to developing an expensive fill-scale prototype transport technology demonstrator. Drygen's SR-71 assets, modified appropriately, are a suitable test-bed for supporting flight demonstrations and validations of certain transport technology solutions. A subscale, manned or unmanned flight demonstrator is suitable for flight validation of transport technology solutions, if appropriate structural similarity relationships can be established. The author contends that developing a full-scale prototype transport technology demonstrator is the best alternative to ensuring that a positive decision to develop a transport is reached by the United States aerospace industry.

  16. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  17. FraudDecnService

    Data.gov (United States)

    Department of Veterans Affairs — Retrieves and updates data to indicate any award lines that have been reduced or terminated. The data is captured by the Fraud Decision screen (as part of the Awards...

  18. Report: EPA Office of Inspector General’s Report on Reducing Fraud, Waste, and Abuse in the Small Business Innovative Research Program, as Required by the National Defense Authorization Act for Fiscal Year 2012, Pub. L. 112-81 (2012)

    Science.gov (United States)

    September 28, 2012. The EPA OIG is required by Section 5143 of the NDA Act for Fiscal Year 201 2, Pub. L. No. 112-81 (2012), to report on reducing vulnerability to fraud, waste and abuse in the Small Business Innovative Research (SBIR) program.

  19. FraudBuster: Reducing Fraud in an Auto Insurance Market.

    Science.gov (United States)

    Nagrecha, Saurabh; Johnson, Reid A; Chawla, Nitesh V

    2018-03-01

    Nonstandard insurers suffer from a peculiar variant of fraud wherein an overwhelming majority of claims have the semblance of fraud. We show that state-of-the-art fraud detection performs poorly when deployed at underwriting. Our proposed framework "FraudBuster" represents a new paradigm in predicting segments of fraud at underwriting in an interpretable and regulation compliant manner. We show that the most actionable and generalizable profile of fraud is represented by market segments with high confidence of fraud and high loss ratio. We show how these segments can be reported in terms of their constituent policy traits, expected loss ratios, support, and confidence of fraud. Overall, our predictive models successfully identify fraud with an area under the precision-recall curve of 0.63 and an f-1 score of 0.769.

  20. 42 CFR 455.21 - Cooperation with State Medicaid fraud control units.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Cooperation with State Medicaid fraud control units... Detection and Investigation Program § 455.21 Cooperation with State Medicaid fraud control units. In a State with a Medicaid fraud control unit established and certified under subpart C of this part, (a) The...

  1. CERN anti-fraud policy

    CERN Multimedia

    2013-01-01

    In 2011, a working group on improved fraud prevention and management was established. The group was composed of the Director of Administration and General Infrastructure, the Head of the Human Resources Department, and the Heads of the Legal Service and Internal Audit. It recommended the adoption of a global fraud prevention and management policy.   The global fraud prevention and management policy was implemented through the CERN Anti-Fraud Policy, which was endorsed by the Enlarged Directorate in May 2012 and approved by the Director-General for entry into force on 1 January 2013. The CERN Anti-Fraud Policy defines the Organization’s policy in matters of fraud.  CERN has a zero tolerance approach towards fraud, as it would compromise the accomplishment of its objectives and undermine its functioning, credibility and reputation. The policy also states CERN’s commitment to the prevention, identification and investigation of fraud. All CERN contributors have a key rol...

  2. Fraud in Hospitals

    OpenAIRE

    Musau, Steve; Vian, Taryn

    2008-01-01

    Hospitals are vulnerable to corruption. In the U.S., health care fraud has been stimated to cost $60 billion per year, or 3% of total health care expenditures - much of it in the hospital sector. Hospitals account for 50% or more of health care pending in many countries. Fraud and corruption in hospitals negatively affect access and quality, as public servants make off with resources which could have been used to reduce out-of-pocket expenditures for patients, or improve needed services. This...

  3. Dissecting One Click Frauds

    Science.gov (United States)

    2010-04-23

    frauds ENom 47.56% GMO Internet 17.48% Above 5.14% Go Daddy 4.11% Tucows 3.34% Key Systems 2.83% New Dream Network 1.54% Abdomainations 1.29% All...note that ENom is apparently much more victim of abuse than other top domain name registrars. Likewise, Above and GMO Internet rank highly with

  4. The Civil Engineering Graduate Program at PUC-Rio: A Brazilian Experience.

    Science.gov (United States)

    Romanel, Celso; Filho, Jose Napoleao

    This document discusses the graduate programs in civil engineering at the Pontifical Catholic University of Rio de Janeiro, Brazil, the oldest Brazilian private university. The report features discussions of faculty member backgrounds, trends in student enrollment, women's participation in the program, degree completion, student origins,…

  5. Civil Remedies Division Administrative Law Judge Decisions

    Data.gov (United States)

    U.S. Department of Health & Human Services — Decisions issued by Administrative Law Judges of the Departmental Appeals Board's Civil Remedies Division concerning fraud and abuse determinations by the Office of...

  6. FRAUD IN ELECTRONIC COMMERCE

    Directory of Open Access Journals (Sweden)

    Valentin – Stelian Bădescu

    2013-11-01

    Full Text Available Electronic commerce is experiencing a great extent, and about the same extent fraud seeks - and sometimes is the place to impressive levels. Moreover, computer fraud and, the actors' they do not seem to suffer from the global economic recession and get as sophisticated as a legitimate business model and one of the most important dimensions of the work of modern organizations is the manipulation of information (collection, processing, storage, distribution, etc.. This component informational increasingly involves broader and more complex, with the technological advancement of computer science and globalization of human society, special measures to ensure the security of information. Cyber-crime is an illegal act committed by using a computer network (especially Internet. Cyber-crime is a subset of cybercrime.

  7. Program of financial support of civil society organizations in Tijuana: Building a relationship between civil society and municipal government from a political change

    Directory of Open Access Journals (Sweden)

    Sheila Delhumeau Rivera

    2008-07-01

    Full Text Available This document analyzes the relations between society and government that took place with the Financial Aid to Civil Society Organizations Program in Tijuana. The decentralization process of social policy in Mexico is revised as the context in which new programs and initiatives are developed promoting a stronger participation of the society in the policy process. The reflection on the social policy of the National Action Party in Baja California since 1989, has lead us to see the new challenges that the Financial Aid to Civil Society Organizations Program presents to the local and state government and the social organizations.

  8. 76 FR 15105 - Medicare and Medicaid Programs; Civil Money Penalties for Nursing Homes

    Science.gov (United States)

    2011-03-18

    ... Services 42 CFR Part 488 [CMS-2435-F] Medicare and Medicaid Programs; Civil Money Penalties for Nursing... incentives for quality improvement, and to remove uncertainty for nursing homes, we proposed to set the... Vol. 76 Friday, No. 53 March 18, 2011 Part III Department of Health and Human Services Centers for...

  9. Kajian: Fraud (Kecurangan) Laporan Keuangan

    OpenAIRE

    Putri, Anisa

    2012-01-01

    Fraudulent misstatement or omission is deliberate amount or disclosures in financial statement. Perpetrators of fraud from people within the company can be from outside the company. Triggers fraud was caused by greed, needs, pressures, opportunities and rational.Financial statements contain material misstatements may result in financial statements are not presented fairly, in all material respects. Misstatement of financial statements may occur as a result of mistake or fraud. In order compan...

  10. Fraud risks in emissions trading

    International Nuclear Information System (INIS)

    2010-09-01

    The system of emission trading is a complex composed entity with on the one hand a strong environmental component and on the other hand a financial world that hooked on this instrument. In chapter 2 an introduction is provided to the emission trading system. The subsequent chapters elaborate Types of Fraud (Chapter 3), Powers (Chapter 4), and Instruments (Chapter 5). The report shows that various forms of fraud are occurring in emission trading, such as VAT fraud and identity theft. [nl

  11. FRAUD BETWEEN DEFINITION AND WAYS TO DEFRAUD ILLUSTRATED BY EXAMPLES

    Directory of Open Access Journals (Sweden)

    Ionut Spatarelu

    2016-12-01

    Full Text Available Auditors have a key role in the formulation of an opinion on the effective functioning of management and control systems of the operational programs co-financed by ESIF. International Auditing Standards states that the primary responsibility for preventing and detecting fraud lies with both top management and those responsible for governance of the entity. On the other hand, the auditors also play a role in the fight against fraud and should help Member States fulfill their obligations to prevent, detect and correct irregularities and fraud.

  12. The Liability of Colleges and Universities for Fraud, Waste, and Abuse in Federally Funded Grants and Projects.

    Science.gov (United States)

    Gordon, Steven D.

    1992-01-01

    Reviews legal and practical aspects of a university's potential liability for fraud, waste, and abuse. Discusses the array of criminal, civil, and administrative sanctions that may be imposed on grantees who engage in fraudulent practices. (84 references) (MLF)

  13. Opinion polls and the U.S. civil space program

    Science.gov (United States)

    Kraemer, Sylvia K.

    1993-11-01

    The conclusions that can be drawn from public opinion polls depend a great deal on what usually does not appear on the newspaper page or television screen. Subtle biases can result from the population interviewed, the time of day individuals were called, how a particular question was asked, or how the answer was interpreted. Examples are the 1961 Gallop Poll, the survey done for Rockwell International by the firm of Yankelovich, Skelly and White/Clancy Shulman, and the one done by Jon D. Miller of the International Center for the Advancement of Scientific Literacy. There is more to learn from opinion polls than that a good proportion of adult Americans support the space program. We can learn that social and economic security are not competing goals with space, but interdependent goals. If we want to increase public support for space, we must increase the number of Americans who have the economic freedom to take an interest in something besides getting by, day after day. We can also learn that the majority of those who support the space program can distinguish between the bread and circuses of space travel. They are content to experience extraordinary adventures in the movie theaters; for their tax dollars they want real return in expended scientific knowledge and understanding. Finally, we can learn that we need to increase that return, not just for scientific careers, but for the ordinary people who pay our bills and for their children, our children. Ultimately, the space program is for them, as all investments in the future must be.

  14. Fraud Education for Accounting Students.

    Science.gov (United States)

    Peterson, Bonita K.

    2003-01-01

    Reports that limited fraud education takes place in accounting due to a crowded curriculum and misunderstanding of the extent of fraud. Suggests ways to develop content on the topic and provides a list of teaching materials (textbooks, workbooks, trade books, case materials, videos, and reference materials). (Contains 16 references.) (SK)

  15. Food fraud vulnerability and its key factors

    NARCIS (Netherlands)

    Ruth, van Saskia M.; Huisman, Wim; Luning, Pieternel A.

    2017-01-01

    Background Food fraud prevention and fraud vulnerability reduction are the first steps to combat food fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of fraud, it requires different tactics than the common food safety approaches. However,

  16. Borderless Crime - Computer Fraud

    Directory of Open Access Journals (Sweden)

    Raluca Georgiana POPA

    2012-05-01

    Full Text Available Starting from the consideration that fighting cybercrime is a continuous process, the more the types of old crimes are committed today through modern means (computer fraud at distances of thousands of kilometers, international cooperation is vital to combat this phenomenon.In EU countries, still under financial crisis "the phrase", cybercrime has found a "positive environment" taking advantage of poor security management systems of these countries.Factors that led criminal groups to switch "their activities" are related to so-called advantages of the "gains" obtained with relatively low risk.In Romania, more than any of the EU member states criminal activities set as target financial institutions or foreign citizens, weakening confidence in financial systems and the security of communication networks in our country, people's confidence in electronic payment instruments and those available on the Internet.

  17. The recruitment mechanism in Spaish and U.S. guest worker programs: preventing fraud and abuse in worker selection and hiring

    OpenAIRE

    Minaya, Mariana

    2015-01-01

    Fraudulent recruitment of authorized, temporary “guest workers” is a growing concern among international policy makers. Recruitment in many countries is regulated through a combination of immigration, criminal, and administrative laws. This paper will compare how two countries, Spain and the United States, regulate the recruitment of agricultural and low-skilled guest workers, a population generally vulnerable to fraud, based on a review of each country’s laws and relevant literature. The con...

  18. CERTIFICATION - The final and critical stage of every civil or military aviation program

    Directory of Open Access Journals (Sweden)

    Vasile STEFAN

    2012-06-01

    Full Text Available As a general rule the final step in every aviation program is the certification of the airplane, an important step in which the airplane, the engins and the equipments are checked by an authority or commission according to the airworthiness rules. The main scope of the certification is to promote a safe aviation product and to protect the general public from unnecessary risk. In all the contries the national authorieties require a civil certificability for all the parts or equipments and a full aircraft certification for a new or wholly modified airplane. The military aircrafts must pased and respond to a specific way of certification and many actual efforts are done in order to unify the diffrent national rules in this field. This paper presents the existing situation in the certification of civil and military airplans and the actual measures done for the unification of certification procedures in the world.

  19. Corruption, fraud and internal control

    Directory of Open Access Journals (Sweden)

    Luminiţa IONESCU

    2010-12-01

    Full Text Available The economic crunch created a specific context for activity and profitability failing. The corruption is more and more common in our days. In the same time, the amount of money lost by businesses and the public sector to larger frauds increased last year to unthinkable limits. The shareholders expect the directors to take care to protect their company’s assets. This is why the financial controller has a very important role in each organization. The techniques to detect corruption or a fraud are developing every year. Thus, the introduction of computerized accounting has created the opportunities to conduct very comprehensive tests at relatively little cost. However, the fraudsters became more and more clever, and the controllers are responsible for the prevention and detection of fraud. The procedures that controllers should adopt with regard to fraud depend on the risk that fraud could occur and remain undetected and also the risk of that fraud impairing the truth and fairness of the statement.

  20. Fraud: zero tolerance at CERN

    CERN Multimedia

    2014-01-01

    In this week’s Bulletin (see here), you’ll read that fraudulent activities were uncovered last year by our Internal Audit Service. CERN has a very clearly defined policy in such cases: we base our efforts on prevention through education, we have a policy of protecting those reporting fraud from recrimination, and we have a zero-tolerance policy should fraud be uncovered.   I don’t intend to enter into the details of what occurred, but I’d like to remind you that fraud is a very grave business, and something we take extremely seriously. What do we mean by fraud at CERN? Operational Circular No. 10 on “Principles and procedures governing the investigation of fraud” defines fraud in terms of any deception intended to benefit the perpetrator, or a third party, that results in a loss to the Organization. This loss can be to funds, property or reputation. Thankfully, fraud at CERN is a rare occurrence, but we should never be complacent. ...

  1. Evaluation of Current Automated Civil Engineer System Non-Appropriated Funds Project Programming Procedures

    National Research Council Canada - National Science Library

    Ligday, Joshua

    2004-01-01

    ...) to support the changing needs of the organization. The Air Force civil engineering organization is no exception since they have drastically improved their Automated Civil Engineer System (ACES...

  2. Electronic fraud (cyber fraud risk in the banking industry, Zimbabwe

    Directory of Open Access Journals (Sweden)

    Shewangu Dzomira

    2014-06-01

    Full Text Available The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that most of the cited types of electronic fraud are perpetrated across the banking industry. Challenges like lack of resources (detection tools and technologies, inadequate cyber-crime laws and lack of knowledge through education and awareness were noted. It is recommended that the issue of cyber security should be addressed involving all the stakeholders so that technological systems are safeguarded from cyber-attacks

  3. Poster: Report Fraud Waste and Abuse to the EPA OIG Hotline

    Science.gov (United States)

    The EPA OIG hotline receives complaints of fraud, waste, and abuse in EPA and U.S. Chemical Safety Board programs and operations including mismanagement or violations of law, rules, or regulations by EPA employees or program participants.

  4. The high speed civil transport and NASA's High Speed Research (HSR) program

    Science.gov (United States)

    Shaw, Robert J.

    1994-01-01

    Ongoing studies being conducted not only in this country but in Europe and Asia suggest that a second generation supersonic transport, or High-Speed Civil Transport (HSCT), could become an important part of the 21st century international air transportation system. However, major environmental compatibility and economic viability issues must be resolved if the HSCT is to become a reality. This talk will overview the NASA High-Speed Research (HSR) program which is aimed at providing the U.S. industry with a technology base to allow them to consider launching an HSCT program early in the next century. The talk will also discuss some of the comparable activities going on within Europe and Japan.

  5. Corruption, fraud and internal control

    OpenAIRE

    Luminiţa IONESCU

    2010-01-01

    The economic crunch created a specific context for activity and profitability failing. The corruption is more and more common in our days. In the same time, the amount of money lost by businesses and the public sector to larger frauds increased last year to unthinkable limits. The shareholders expect the directors to take care to protect their company’s assets. This is why the financial controller has a very important role in each organization. The techniques to detect corruption or a fraud a...

  6. New European approach to combat VAT fraud?

    NARCIS (Netherlands)

    Griffioen, M.; Hel - van Dijk, van der E.C.J.M. (Lisette)

    2014-01-01

    The Member States of the European Union (EU) are missing billions of Euros each year as a result of cross-border VAT fraud. After its introduction, the current VAT system appeared to contain flaws and proved to be vulnerable to fraud. Tackling VAT fraud since then has become serious business within

  7. Aspects Concerning the Relationship between Internal Audit and Fraud Risk

    Directory of Open Access Journals (Sweden)

    Ioana Lupasc

    2016-07-01

    Full Text Available In the current economical situation, fraud cannot be regarded as an exception with random occurrence and limited effects on credit institution. Major fraud scandals that shook the financial markets required a rethinking of the organization and control of the banks to keep intact the trust of customers. Identifying and assessing risks is a concern not only for managers, but also for internal and external auditors. Management may implement programs or measures to limit the risks or deciding to accept some risks. In order to identify the main causes generating fraud risk and increasing the quality of banking activity we used a quantitative research method that was based on a questionnaire administered individually, using SPSS.

  8. A prescription fraud detection model.

    Science.gov (United States)

    Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan

    2012-04-01

    Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  9. Statistical fingerprints of electoral fraud?

    NARCIS (Netherlands)

    Kobak, Dmitry; Shpilkin, Sergey; Pshenichnikov, Maxim S.

    2016-01-01

    Protests greeted the results of Russia's federal election in 2011, with accusations of vote-rigging and fraud. With the country heading to the polls again this September, Dmitry Kobak, Sergey Shpilkin and Maxim S. Pshenichnikov shine a light on several anomalies in the election data set.

  10. Store Security. Credit Card Fraud.

    Science.gov (United States)

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  11. Equal Potential: A Collective Fraud.

    Science.gov (United States)

    Gottfredson, Linda S.

    2000-01-01

    Critiques the College Board's report, "Reaching the Top," asserting that it illustrates collective fraud in the social sciences, which sustains an egalitarian fiction that intelligence is clustered equally across all human populations. Suggests that while the report omits certain popular falsehoods, it also omits crucial truths about…

  12. Auditing for the Corporate Fraud Prevention

    Directory of Open Access Journals (Sweden)

    Nazarova Karina O.

    2017-10-01

    Full Text Available The main threats to business are: competitors; supervisory and investigative bodies; tax system; crisis developments; currency exchange rates and so on. However, the world experience of recent decades has shown that not only external phenomena but also own employees can be perceived as tangible threats to business. On the part of the staff, there are, for various reasons, provocations, errors, deception or fraud, which could infringe security of enterprise. The article examines the status and dynamics of corporate fraud in Ukraine and in the world, the most common ways of detecting fraud, the methods that are used to counter it, as well as preventive means. The need to counter fraud within the corporate organization has been substantiated, efficiency of the internal and the external audits in detecting and preventing deception and fraud of employees of enterprise has been proven. The existing ways of detecting fraud in Ukraine were analyzed.

  13. AN APPROACH TO FRAUD RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Monica PUIU

    2014-11-01

    Full Text Available Nowadays, globalisation and business internalisation have led to an increased number of frauds in organisations worldwide. The most affected are the multinational corporations because of the geographical distance, different fiscal systems and local factors that consist in tremendous opportunities for employees and/or managers to involve in fraud schemes. Starting from recent studies and prior efforts of international organisations or countries to stop fraud by imposing regulations to be respected for the economic environment, the purpose of the paper is finding the key factors for detecting and preventing fraud in the organisations. In our approach we use several proposals for a conceptual framework developed by two companies of “The big four”, KPMG and Deloitte. The results indicate that for the number of fraud to decrease, any organisation needs to develop and implement a strong anti-fraud plan, by covering all logical steps to be made in this matter.

  14. 75 FR 57230 - 340B Drug Pricing Program Manufacturer Civil Monetary Penalties

    Science.gov (United States)

    2010-09-20

    ... Civil Monetary Penalties AGENCY: Health Resources and Services Administration, HHS. ACTION: Advance notice of proposed rulemaking and request for comments. SUMMARY: Section 602 of Public Law 102-585, the... of civil monetary penalties for manufacturers that knowingly and intentionally overcharge a covered...

  15. 75 FR 39641 - Medicare and Medicaid Programs; Civil Money Penalties for Nursing Homes

    Science.gov (United States)

    2010-07-12

    ... law judge (ALJ) reverses the civil money penalty determination in whole or in part, the escrowed..., widespread harm, or resulting in a resident's death is not eligible for the civil money penalty reduction... Penalties for Nursing Homes AGENCY: Centers for Medicare & Medicaid Services (CMS), HHS. ACTION: Proposed...

  16. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. ... testing the methods with data from real mobile communications networks. Keywords: Call data, fraud ...... Ph. D. thesis. Pur-.

  17. Implementing US-style anti-fraud laws in the Australian pharmaceutical and health care industries.

    Science.gov (United States)

    Faunce, Thomas A; Urbas, Gregor; Skillen, Lesley

    2011-05-02

    This article critically analyses the prospects for introducing United States anti-fraud (or anti-false claims) laws in the Australian health care setting. Australian governments spend billions of dollars each year on medicines and health care. A recent report estimates that the money lost to corporate fraud in Australia is growing at an annual rate of 7%, but that only a third of the losses are currently being detected. In the US, qui tam provisions - the component of anti-fraud or anti-false claims laws involving payments to whistleblowers - have been particularly successful in providing critical evidence allowing public prosecutors to recover damages for fraud and false claims made by corporations in relation to federal and state health care programs. The US continues to strengthen such anti-fraud measures and to successfully apply them to a widening range of areas involving large public investment. Australia still suffers from the absence of any comprehensive scheme that not only allows treble damages recovery for fraud on the public purse, but crucially supports such actions by providing financial encouragement for whistleblowing corporate insiders to expose evidence of fraud. Potential areas of application could include direct and indirect government expenditure on health care service provision, pharmaceuticals, medical devices, defence, carbon emissions compensation and tobacco-related illness. The creation in Australia of an equivalent to US anti-false claims legislation should be a policy priority, particularly in a period of financial stringency.

  18. 28 CFR 16.89 - Exemption of Civil Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... prosecution of grand jury, civil fraud, and other law enforcement matters, disclosure could compromise matters... affirmative enforcement actions based upon alleged violations of regulations or of civil or criminal laws... civil law enforcement purposes is exempted for the reasons set forth from the following subsections: (1...

  19. Civil engineering support for the traffic monitoring program : final report, January 2010.

    Science.gov (United States)

    2010-01-01

    This project was aimed at providing various civil engineering support services for the telemetered traffic monitoring sites operated by the Statistics Office of the Florida Department of Transportation. This was a companion project to the one that pr...

  20. PREDICTIVE ANALYTICS OF THE FRAUD PREVENTION AND DETECTION AT ASF LEVEL

    Directory of Open Access Journals (Sweden)

    Constanta Iacob

    2016-12-01

    Full Text Available A need for greater rigor, which is felt by insurance companies in order to guarantee the fundamental balance of their financial sources, led to intensification of the concerns for preventing and combating fraud. The scope of the controller's mission is variable and its limits are set by the control program which has been established. In assessing the fair price of the caused damage, the essential role of the controller is to put a stop to the fraud and to avoidearly damage coverage.But information is required in order to accomplish this.The predictive analytics, of those processes necessary to prevent and combat fraud, is a way of passing from a retroactive and intuitive process to a proactive one, that is oriented according to the information possessed. Based on this approach, insurance companies can build models, to predict the risk of fraud, in order to reduce their financial-cost impact.

  1. Inspector General, DoD, Oversight of the Army Audit Agency Audit of the U.S. Army Corps of Engineers, Civil Works Program, FY 1996 Financial Statements

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The audit objective was to determine the accuracy and completeness of the audit of the U.S. Army Corps of Engineers, Civil Works Program, FY 1996, financial statements conducted by the Army Audit Agency...

  2. Forensic accounting in the fraud auditing case

    Directory of Open Access Journals (Sweden)

    Nataša Simeunović

    2016-11-01

    Full Text Available This paper presents a real case of digital forensic analysis in organizational fraud auditing process investigated using two different forensic tools, namely Tableau TD3 Touch Screen Forensic Imager and Access Data FTK Imager. Fraud auditing is more of a mindset than a methodology and has different approaches from financial auditing. Fraud auditors are mostly focused on exceptions, accounting irregularities, and patterns of their conduct. Financial auditors place special emphasis on the audit trail and material misstatements. A fraud case investigation of non-cash misappropriations committed by an employee, the warehouseman, will be presented herein in order to highlight the usefulness of fraud auditing, which can reveal many forms of financial crime and can be used in both private and public sector companies. Due to the computerized accounting environment, fraud investigation requires a combination of auditing, computer crime and digital forensic investigation skills, which can be achieved through joint efforts and cooperation of both digital investigator and fraud auditor as proposed herein.

  3. 7 CFR 276.3 - Negligence or fraud.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Negligence or fraud. 276.3 Section 276.3 Agriculture... Negligence or fraud. (a) General. If FNS determines that there has been negligence or fraud on the part of..., pay to FNS a sum equal to the amount of coupons issued as a result of such negligence or fraud. (b...

  4. Fraud Auditing and CPA Auditing Reform in American and Japanese

    OpenAIRE

    張, 影; ZHANG, Ying

    2006-01-01

    The public company audit is expected to detect frauds in the financial reporting of entity. But, if senior management of corporation want to perpetrate frauds, the auditors have a risk of material misstatement due to fraud. In this paper, I consider the history of public company auditing to improve the prevention and detection of material fraud and to educate financial statement users about frauds in financial statement of American corporation and Japanese corporation. The history also is sho...

  5. IMpact of international accreditation in the recognition of academic degrees in the domestic and foreign labor market. Case study: Civil engineering program

    Directory of Open Access Journals (Sweden)

    Jose Barragan Codina

    2015-07-01

    Full Text Available In a globalized era it is not enough to have a professional qualification to ensure economic and professional success. The academic background of professionals must be adequate to face challenges and solve problems of a globalized and dynamic world. Civil engineers face many complications when seeking an international career. There are many differences within the profession globally such as: resources, workforce, climate, language, culture, philosophies, regulations, etc. which raise the entry barriers to fully practice as a civil engineer. The International accreditations play a major role as the first evidence of the civil engineer technical proficiency. These assure the quality of the higher education curricula and add value to the human capital on an international context. Despite the fact that many Mexican Universities have academic programs which have international accreditations, civil engineer graduates cannot easily work across borders. This paper describes the impact that international accreditation has for civil engineers when seeking an international career.

  6. Enhancing a Person, Enhancing a Civilization: A Research Program at the Intersection of Bioethics, Future Studies, and Astrobiology.

    Science.gov (United States)

    Ćirković, Milan M

    2017-07-01

    There are manifold intriguing issues located within largely unexplored borderlands of bioethics, future studies (including global risk analysis), and astrobiology. Human enhancement has for quite some time been among the foci of bioethical debates, but the same cannot be said about its global, transgenerational, and even cosmological consequences. In recent years, discussions of posthuman and, in general terms, postbiological civilization(s) have slowly gained a measure of academic respect, in parallel with the renewed interest in the entire field of future studies and the great strides made in understanding of the origin and evolution of life and intelligence in their widest, cosmic context. These developments promise much deeper synergic answers to questions regarding the long-term future of enhancement: how far can it go? Is human enhancement a further step toward building a true postbiological civilization? Should we actively participate and help shape this process? Is the future of humanity "typical" in the same Copernican sense as our location in space and time is typical in the galaxy, and if so, can we derive important insights about the evolutionary pathways of postbiological evolution from astrobiological and Search for ExtraTerrestrial Intelligence (SETI) studies? These and similar questions could be understood as parts of a possible unifying research program attempting to connect cultural and moral evolution with what we know and understand about their cosmological and biological counterparts.

  7. Fraud and plagiarisim in school and career.

    Science.gov (United States)

    Agud, J L

    2014-10-01

    Between 0% and 94% of university students acknowledge having committed academic fraud. Its forms are varied: cheating on examinations, submitting someone else's work, plagiarism, false citations, false reporting on experiments, tests or findings in the medical history and physical examination, unfair behavior toward fellow students, and many others. The consequences of academic fraud include learning corruption, useless efforts by students and faculty, incorrect performance evaluations and unfair selection for jobs. Since this can be a prelude to future fraud as doctors or researches, the prevalence, risk factors, motivations, clinical appearances, detection and prevention of the disease of academic fraud are here reviewed. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.

  8. Unsupervised learning for robust bitcoin fraud detection

    CSIR Research Space (South Africa)

    Monamo, Patrick

    2016-08-01

    Full Text Available The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud. Anomaly detection plays a pivotal role in data mining since most outlying...

  9. Is writing style predictive of scientific fraud?

    DEFF Research Database (Denmark)

    Braud, Chloé Elodie; Søgaard, Anders

    2017-01-01

    The problem of detecting scientific fraud using machine learning was recently introduced, with initial, positive results from a model taking into account various general indicators. The results seem to suggest that writing style is predictive of scientific fraud. We revisit these initial experime......The problem of detecting scientific fraud using machine learning was recently introduced, with initial, positive results from a model taking into account various general indicators. The results seem to suggest that writing style is predictive of scientific fraud. We revisit these initial...... experiments, and show that the leave-one-out testing procedure they used likely leads to a slight over-estimate of the predictability, but also that simple models can outperform their proposed model by some margin. We go on to explore more abstract linguistic features, such as linguistic complexity...

  10. Corporate Fraud and Internal Control: A Framework for Prevention. By Richard E. Cascarino, Wiley, 2013; 388 Pages. Price £50.00 / €60.00, ISBN 978-1-1183-0156-2

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2013-02-01

    Full Text Available The publication Corporate Fraud and Internal Control contains essential guidance for companies to examine and improve their fraud programs: Corporate governance legislation has become increasingly concerned with the ongoing resilience of organizations and, particularly, with their ability to resist corporate fraud from the lowest levels to the upper echelons of executive management. It has become unacceptable for those responsible for corporate governance to claim, "I didn't know". Corporate Fraud and Internal Control focuses on the appropriateness of the design of the system of internal controls in fraud risk mitigation, as well as the mechanisms to ensure effective implementation and monitoring on an ongoing basis. 

  11. Financial Statement Fraud Detection using Text Mining

    OpenAIRE

    Rajan Gupta; Nasib Singh Gill

    2013-01-01

    Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement frau...

  12. Tax evasion between fraud and legality

    Directory of Open Access Journals (Sweden)

    Opreţ Laura-Anca

    2017-12-01

    Full Text Available This paper focuses on detailing the general coordinates regarding tax evasion and the necessity of creating a common unitary European legal framework. Accounting information might mirror erroneously in a certain measure the micro to macroeconomic tendency of fraud by showing a gross image of available resources. It is of the utmost importance to become fully aware of causes for illicit practices, ways to fight any fraud attempts and to evaluate the accounting mechanism that both creates and identifies tax evasion.

  13. Partnership model of vocational education with the business sector in civil engineering expertise program of Vocational Secondary Schools

    Directory of Open Access Journals (Sweden)

    I Kadek Budi Sandika

    2018-01-01

    Full Text Available This study aims to: (1 develop a partnership model of vocational education with business sectors in civil engineering expertise program of vocational secondary schools in Bali and (2testing the effectiveness and efficiency of partnership model developed. The study used the design and development model of Richey & Klein (2009, which consists of three main phases, namely the phase of model development, model validation, and model testing. The phase of model development used the qualitative approach, through literature review, observation and interview. Expert review techniques were used in the model validation phase. The model testing used pre-experimental design with one-shot case study. The study found that the partnership model of vocational education with the business sector in civil engineering expertise program of vocational secondary schools in Bali involves several components, such as key stakeholders, the underlying principle of partnership, orientation/common goal, the management of educational resources (teachers and facilities, curriculum development, implementation of learning/training and work practices, competency test of graduates, distribution of learning outcomes/output, as well as monitoring, evaluation and feedback of partnership program. Experimental results show that the partnership model developed has met all of the criteria (effective, practical and efficient.

  14. The United States Humanitarian Demining Program: Civil-Military Relations in Humanitarian Demining

    Science.gov (United States)

    2015-05-23

    society: (1) social composition of the officer corps, (2) political decision-making process, (3) recruitment method, and (4) military style .”50...which had sheltered the 9/11 attacker’s parent organization, Al Qaeda contributed to the already dangerous landmine contamination in the country...military and the people are less authoritative . Examples in Afghanistan during the civil war and post 9/11 periods show a range of interaction, from

  15. Drug Pricing Program Ceiling Price and Manufacturer Civil Monetary Penalties Regulation. Final rule; further delay of effective date.

    Science.gov (United States)

    2017-09-29

    The Health Resources and Services Administration (HRSA) administers section 340B of the Public Health Service Act (PHSA), known as the "340B Drug Pricing Program" or the "340B Program." HRSA published a final rule on January 5, 2017, that set forth the calculation of the ceiling price and application of civil monetary penalties. The final rule applied to all drug manufacturers that are required to make their drugs available to covered entities under the 340B Program. On August 21, 2017, HHS solicited comments on further delaying the effective date of the January 5, 2017, final rule to July 1, 2018 (82 FR 39553). HHS proposed this action to allow a more deliberate process of considering alternative and supplemental regulatory provisions and to allow for sufficient time for additional rulemaking. After consideration of the comments received on the proposed rule, HHS is delaying the effective date of the January 5, 2017, final rule, to July 1, 2018.

  16. Employing Artificial Intelligence To Minimise Internet Fraud

    Directory of Open Access Journals (Sweden)

    Edward Wong Sek Khin

    2009-12-01

    Full Text Available Internet fraud is increasing on a daily basis with new methods for extracting funds from government, corporations, businesses in general, and persons appearing almost hourly. The increases in on-line purchasing and the constant vigilance of both seller and buyer have meant that the criminal seems to be one-step ahead at all times. To pre-empt or to stop fraud before it can happen occurs in the non-computer based daily transactions of today because of the natural intelligence of the players, both seller and buyer. Currently, even with advances in computing techniques, intelligence is not the current strength of any computing system of today, yet techniques are available which may reduce the occurrences of fraud, and are usually referred to as artificial intelligence systems.This paper provides an overview of the use of current artificial intelligence (AI techniques as a means of combating fraud.Initially the paper describes how artificial intelligence techniques are employed in systems for detecting credit card fraud (online and offline fraud and insider trading.Following this, an attempt is made to propose the using of MonITARS (Monitoring Insider Trading and Regulatory Surveillance Systems framework which use a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing. Finally, the paper discusses future research agenda to the role of using MonITARS system.

  17. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  18. GPS Civil Monitoring Performance Specification

    Science.gov (United States)

    2009-02-10

    This Civil Monitoring Performance Specification (CMPS) is published and maintained at : the direction of the Program Manager for Civil Applications, Global Positioning Systems : Wing (GPSW). The purpose of this document is to provide a comprehensive ...

  19. Holistic approach to fraud management in health insurance

    Directory of Open Access Journals (Sweden)

    Štefan Furlan

    2008-12-01

    Full Text Available Fraud present an immense problem for health insurance companies and the only way to fight fraud is by using specialized fraud management systems. The current research community focussed great efforts on different fraud detection techniques while neglecting other also important activities of fraud management. We propose a holistic approach that focuses on all 6 activities of fraud management, namely, (1 deterrence, (2 prevention, (3 detection, (4 investigation, (5 sanction and redress, and (6 monitoring. The main contribution of the paper are 15 key characteristics of a fraud management system, which enable construction of a fraud management system that provides effective and efficient support to all fraud management activities. We base our research on literature review, interviews with experts from different fields, and a case study. The case study provides additional confirmation to expert opinions, as it puts our holistic framework into practice.

  20. WAREHOUSE TRANSFERS AND FISCAL FRAUD

    Directory of Open Access Journals (Sweden)

    Stanciu Dorica

    2015-07-01

    Full Text Available The fraud and fiscal evasion phenomenon generate indisputable negative effects, which are felt directly on the level of fiscal receipts earnings, determining major distortions in the market’s functioning mechanism. If in the European Union, the contribution of the three large tax categories (direct tax, indirect and social contributions in forming revenue are relatively close, in Romania, fiscal and budget revenue are directly dependent on the indirect tax and duties, especially on VAT and various sales taxes. If there is reductions in the fiscal evasion as to what these taxes are concerned, the premises for creating budget resource needed to fund the economic growth are created. In judicial literature, tax evasion is considered as being the logic result of all defects and inadvertencies of an imperfect legislation, of broken application methods, as well as a lack of foreseeing and lack of skill on the law-maker’s side, with their excessive tax system is as guilty as those who contribute in creating it. Regardless of how this phenomenon is defined, fiscal evasion represents the lack of fulfillment by the taxpayer of his fiscal obligation. The field in which tax evasion acts is as widespread as the different taxes, manifesting especially in the direct and indirect taxes, influencing their efficiency.

  1. FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining

    Directory of Open Access Journals (Sweden)

    K. R. Seeja

    2014-01-01

    Full Text Available This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  2. FraudMiner: a novel credit card fraud detection model based on frequent itemset mining.

    Science.gov (United States)

    Seeja, K R; Zareapoor, Masoumeh

    2014-01-01

    This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns. The performance evaluation of the proposed model is done on UCSD Data Mining Contest 2009 Dataset (anonymous and imbalanced) and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.

  3. A Research on the Responsibility of Accounting Professionals to Determine and Prevent Accounting Errors and Frauds: Edirne Sample

    Directory of Open Access Journals (Sweden)

    Semanur Adalı

    2017-09-01

    Full Text Available In this study, the ethical dimensions of accounting professionals related to accounting errors and frauds were examined. Firstly, general and technical information about accounting were provided. Then, some terminology on error, fraud and ethics in accounting were discussed. Study also included recent statistics about accounting errors and fraud as well as presenting a literature review. As the methodology of research, a questionnaire was distributed to 36 accounting professionals residing in Edirne city of Turkey. The collected data were then entered to the SPSS package program for analysis. The study revealed very important results. Accounting professionals think that, accounting chambers do not organize enough seminars/conferences on errors and fraud. They also believe that supervision and disciplinary boards of professional accounting chambers fulfill their responsibilities partially. Attitude of professional accounting chambers in terms of errors, fraud and ethics is considered neither strict nor lenient. But, most accounting professionals are aware of colleagues who had disciplinary penalties. Most important and effective tool to prevent errors and fraud is indicated as external audit, but internal audit and internal control are valued as well. According to accounting professionals, most errors occur due to incorrect data received from clients and as a result of recording. Fraud is generally made in order to get credit from banks and for providing benefits to the organization by not showing the real situation of the firm. Finally, accounting professionals state that being honest, trustworthy and impartial is the basis of accounting profession and accountants must adhere to ethical rules.

  4. How to assess your green fraud risks

    International Nuclear Information System (INIS)

    2011-02-01

    Pressure to conform to a sustainability agenda is coming from customers, investors, employees, industry bodies and the media. This agenda is evolving into a critical part of an organisation's business model, and their relationships, opening up new market opportunities and supporting cost efficiencies. But all changes in business activities also raise the risk of fraud and abuse. Sustainability is no exception. The potential for fraud tends to be greater in new markets, when information is imperfect, standards of measurement and verification are not harmonised and governance is weak. The sustainability marketplace, taken as a whole, is all of these things. To a large extent, the types of fraud appearing are not new. They represent the application of tried and tested fraudulent practices to the sustainability arena. A comprehensive and robust design, rather than an ad hoc, piecemeal approach, is essential for a successful sustainability strategy. An awareness of the risk of potential fraud and the need to incorporate measures to protect against it are part of that process. Sustainable business practices, including a company's mitigation and carbon markets activities, are disclosed as either financial or non-financial data. In this paper, PwC examines some of the green fraud risks that companies face when engaged in such activities and the steps they can take to mitigate or eliminate them.

  5. Accounting Fraud: an estimation of detection probability

    Directory of Open Access Journals (Sweden)

    Artur Filipe Ewald Wuerges

    2014-12-01

    Full Text Available Financial statement fraud (FSF is costly for investors and can damage the credibility of the audit profession. To prevent and detect fraud, it is helpful to know its causes. The binary choice models (e.g. logit and probit commonly used in the extant literature, however, fail to account for undetected cases of fraud and thus present unreliable hypotheses tests. Using a sample of 118 companies accused of fraud by the Securities and Exchange Commission (SEC, we estimated a logit model that corrects the problems arising from undetected frauds in U.S. companies. To avoid multicollinearity problems, we extracted seven factors from 28 variables using the principal factors method. Our results indicate that only 1.43 percent of the instances of FSF were publicized by the SEC. Of the six significant variables included in the traditional, uncorrected logit model, three were found to be actually non-significant in the corrected model. The likelihood of FSF is 5.12 times higher when the firm’s auditor issues an adverse or qualified report.

  6. SLAVERY AND CIVIL LAW IN THE ANTEBELLUM SOUTH—TWO CASE STUDIES

    OpenAIRE

    Harvey Gresham Hudspeth

    2006-01-01

    Antebellum slave law addressed fugitive slaves and criminal offenses committed by masters against slaves and by slaves against masters. Moreover, slaves were both merchandise and personal property that fell under civil monetary statutes pertaining to sales fraud and personal damage to private property. Judgment in two civil cases heard in West Tennessee during the late 185Os turn on such statutes.

  7. SLAVERY AND CIVIL LAW IN THE ANTEBELLUM SOUTH—TWO CASE STUDIES

    Directory of Open Access Journals (Sweden)

    Harvey Gresham Hudspeth

    2006-01-01

    Full Text Available Antebellum slave law addressed fugitive slaves and criminal offenses committed by masters against slaves and by slaves against masters. Moreover, slaves were both merchandise and personal property that fell under civil monetary statutes pertaining to sales fraud and personal damage to private property. Judgment in two civil cases heard in West Tennessee during the late 185Os turn on such statutes.

  8. Evaluation of Current Automated Civil Engineer System Non-Appropriated Funds Project Programming Procedures

    National Research Council Canada - National Science Library

    Ligday, Joshua

    2004-01-01

    ...) project programming business rules within ACES. These problem areas were not addressed until recently when an integrated process team met and proposed numerous changes to how NAF programming is accomplished in ACES...

  9. Effects of three types of retirement preparation program : A qualitative study of civil servants in Brazil

    NARCIS (Netherlands)

    Leandro-Franca, Cristineide; Van Solinge, Hanna; Henkens, Kene; Murta, Sheila Giardini

    2016-01-01

    Studies on the effectiveness of retirement planning programs are relatively scarce. Retirement preparation and planning programs may assist individuals to smooth the transition to retirement and subsequent adjustment. This qualitative study examines the effects of three retirement preparation

  10. Medicaid Fraud Control Units (MFCU) Annual Spending and Performance Statistics

    Data.gov (United States)

    U.S. Department of Health & Human Services — Medicaid Fraud Control Units (MFCU or Unit) investigate and prosecute Medicaid fraud as well as patient abuse and neglect in health care facilities. OIG certifies,...

  11. Exploring fraud triangle in understanding ethics pre-cautionary: a ...

    African Journals Online (AJOL)

    Exploring fraud triangle in understanding ethics pre-cautionary: a Malaysian ... Journal of Fundamental and Applied Sciences ... Various reports on the involvement of government officials in fraud cases indicate the lacking of ethical systems.

  12. Financial fraud and health: the case of Spain

    Directory of Open Access Journals (Sweden)

    Maria Victoria Zunzunegui

    2017-07-01

    Conclusion: The results suggest that financial fraud is detrimental to health. Further research should examine the mechanisms through which financial fraud impacts health. If our results are confirmed psychological and medical care should be provided, in addition to financial compensation.

  13. Fraud Indicators Applied to Legal Entities : An Empirical Ranking Approach

    NARCIS (Netherlands)

    S. van den Braak; R. Choenni; M.S. Bargh

    2014-01-01

    Legal persons (i.e., entities such as corporations, companies, partnerships, firms, associations, and foundations) may commit financial crimes or employ fraudulent activities like money laundering, tax fraud, or bankruptcy fraud. Therefore, in the Netherlands legal persons are automatically screened

  14. DETERMINAN FRAUD BELANJA BANTUAN SOSIAL PEMERINTAH DAERAH

    Directory of Open Access Journals (Sweden)

    Dwi Ratmono

    2016-12-01

    Full Text Available Abstract: Determinans of Fraud of Social Assistance Expenditure in Local Government. This study aims to analyze the determinants of fraud of social assistance expenditures in Local Government. This study use Partial Least Square (PLS as method while Strcutural Equation Modeling (SEM used as analytical tool. The sample is all local governement in Central Java The data used in this study are Auditor Report of BPK.The results show that the determinant of the fraud of social assistance expenditure is internal control system weaknesses and non-compliance with laws and regulations. Therefore, these two factor need attention from local government, regulator and auditor in order to prevent social assistance expenditure in future period.

  15. Fraud detections for online businesses: a perspective from blockchain technology

    OpenAIRE

    Cai, Yuanfeng; Zhu, Dan

    2016-01-01

    Background: The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers. However, it is vulnerable to rating fraud. Some raters may inject unfairly high or low ratings to the system so as to promote their own products or demote their competitors. Method: This study explores the rating fraud by differentiating the subjective fraud from objective fraud. Then it discusses the effectiveness of blockchain technology in objective f...

  16. DETECTING AND REPORTING THE FRAUDS AND ERRORS BY THE AUDITOR

    OpenAIRE

    Ovidiu Constantin Bunget; Alin Constantin Dumitrescu

    2009-01-01

    Responsibility for preventing and detecting fraud rest with management entities.Although the auditor is not and cannot be held responsible for preventing fraud and errors, in yourwork, he can have a positive role in preventing fraud and errors by deterring their occurrence. Theauditor should plan and perform the audit with an attitude of professional skepticism, recognizingthat condition or events may be found that indicate that fraud or error may exist.Based on the audit risk assessment, aud...

  17. Big data based fraud risk management at Alibaba

    OpenAIRE

    Chen, Jidong; Tao, Ye; Wang, Haoran; Chen, Tao

    2015-01-01

    With development of mobile internet and finance, fraud risk comes in all shapes and sizes. This paper is to introduce the Fraud Risk Management at Alibaba under big data. Alibaba has built a fraud risk monitoring and management system based on real-time big data processing and intelligent risk models. It captures fraud signals directly from huge amount data of user behaviors and network, analyzes them in real-time using machine learning, and accurately predicts the bad users and transactions....

  18. Avoiding fraud risks associated with EHRs.

    Science.gov (United States)

    Helton, Jeffrey R

    2010-07-01

    Fraud associated with electronic health records (EHRs) generally falls into two categories: inappropriate billing by healthcare providers and inappropriate access by a system's users. A provider's EHR system requires controls to be of any significant help in detecting such fraudulent activity, or in gathering transactional evidence should such activity be identified. To protect against potential EHR-related healthcare fraud, providers should follow the recommendations established in 2007 by RTI International for the Office of the National Coordinator for Health Information Technology of the U.S. Department of Health and Human Services.

  19. Assessment of food fraud vulnerability in the spices chain

    NARCIS (Netherlands)

    Silvis, I.C.J.; Ruth, van S.M.; Fels, van der Ine; Luning, P.A.

    2017-01-01

    Recent scandals have increased the need to strengthen companies’ ability to combat fraud within their own organizations and across their supply chain. Vulnerability assessments are a first step towards the inventory of fraud vulnerability and fraud mitigation plans. Spices are reported frequently

  20. Space civil engineering - A new discipline

    Science.gov (United States)

    Sadeh, Willy Z.; Criswell, Marvin E.

    1991-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding the Civil Engineering know-how and practice to the development and maintenance of infrastructure on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University under a recently established NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts of the curriculum in the Space Civil Engineering Option at both undergraduate and graduate levels are presented. The role of Space Civil Engineering in the Space Program is discussed.

  1. 340B Drug Pricing Program Ceiling Price and Manufacturer Civil Monetary Penalties Regulation. Final rule; further delay of effective date.

    Science.gov (United States)

    2017-05-19

    The Health Resources and Services Administration (HRSA) administers section 340B of the Public Health Service Act (PHSA), referred to as the "340B Drug Pricing Program" or the "340B Program." HRSA published a final rule on January 5, 2017, that set forth the calculation of the ceiling price and application of civil monetary penalties. The final rule applied to all drug manufacturers that are required to make their drugs available to covered entities under the 340B Program. In accordance with a January 20, 2017, memorandum from the Assistant to the President and Chief of Staff, entitled "Regulatory Freeze Pending Review," HRSA issued an interim final rule that delayed the effective date of the final rule published in the Federal Register (82 FR 1210, (January 5, 2017)) to May 22, 2017. HHS invited commenters to provide their views on whether a longer delay of the effective date to October 1, 2017, would be more appropriate. After consideration of the comments received on the interim final rule, HHS is delaying the effective date of the January 5, 2017 final rule, to October 1, 2017.

  2. 18 CFR 3c.3 - Reporting fraud, waste, abuse, and corruption and cooperation with official inquiries.

    Science.gov (United States)

    2010-04-01

    ..., abuse, and corruption and cooperation with official inquiries. 3c.3 Section 3c.3 Conservation of Power... OF CONDUCT § 3c.3 Reporting fraud, waste, abuse, and corruption and cooperation with official..., abuse, and corruption in Commission programs, including on the part of Commission employees, contractors...

  3. Outlier detection in healthcare fraud: A case study in the Medicaid dental domain

    NARCIS (Netherlands)

    van Capelleveen, Guido Cornelis; Poel, Mannes; Mueller, Roland; Thornton, Dallas; van Hillegersberg, Jos

    Health care insurance fraud is a pressing problem, causing substantial and increasing costs in medical insurance programs. Due to large amounts of claims submitted, estimated at 5 billion per day, review of individual claims or providers is a difficult task. This encourages the employment of

  4. 75 FR 2105 - Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical Equipment...

    Science.gov (United States)

    2010-01-14

    ... schemes that are used to obtain money from these programs and, when appropriate, issues Special Fraud... Dallas TX, LA, AR, OK, NM 214-767-8406 Kansas City MO, ND, SD, MT, KS, IA, CO, NE, 816-426-4000 UT, WY...

  5. 28 CFR 104.71 - Procedures to prevent and detect fraud.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedures to prevent and detect fraud. 104.71 Section 104.71 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) SEPTEMBER 11TH VICTIM COMPENSATION FUND OF 2001 Measures To Protect the Integrity of the Compensation Program § 104.71 Procedures to...

  6. 38 CFR 3.901 - Fraud.

    Science.gov (United States)

    2010-07-01

    ..., Compensation, and Dependency and Indemnity Compensation Forfeiture § 3.901 Fraud. (a) Definition. An act... death benefit payable. (2) Amount of compensation payable but for the forfeiture. No benefits are... affidavit, declaration, certificate, statement, voucher, or paper, concerning any claim for benefits under...

  7. Looking at Debit and Credit Card Fraud

    Science.gov (United States)

    Porkess, Roger; Mason, Stephen

    2012-01-01

    This article, written jointly by a mathematician and a barrister, looks at some of the statistical issues raised by court cases based on fraud involving chip and PIN cards. It provides examples and insights that statistics teachers should find helpful. (Contains 4 tables and 1 figure.)

  8. Finance middle managers and financial statement fraud

    NARCIS (Netherlands)

    Linke, Kristina Gisela Babette

    2012-01-01

    Verslaggevingsfraude is het manipuleren van de boekhouding om betere cijfers te laten zien. Kristina Linke onderzocht deze vorm van fraude, waarbij zij vooral keek naar de rol van de controller. Dat gebeurde aan de hand van 244 aanklachten in de periode 2000-2006 in de Verenigde Staten. Uit het

  9. A systematic approach to study electoral fraud

    DEFF Research Database (Denmark)

    Leemann, Lucas; Bochsler, Daniel

    2014-01-01

    , we propose a more encompassing approach, testing for several empirical implications of different possible forms of fraud. To illustrate this approach we rely on a case of electoral irregularities in one of the oldest democracies: In a Swiss referendum in 2011, one in twelve municipalities irregularly...

  10. An Analysis of Fraud on the Internet.

    Science.gov (United States)

    Baker, C. Richard

    1999-01-01

    Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)

  11. Fraud and Fraudulent Practices in Nigeria Banking

    African Journals Online (AJOL)

    FIRST LADY

    Owolabi, S. A. - Accounting Department, Babcock University, Nigeria. E-mail: ... Abstract. The paper reviews the various forms of fraudulent practice their impact and ... legislations targeted at reducing fraud and introducing some forms of control .... money market and treasury, risk assets, information technology, financial.

  12. Internet Fraud: Information for Teachers and Students

    Science.gov (United States)

    Nkotagu, Gabriel Hudson

    2011-01-01

    Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…

  13. Ethics in health care: healthcare fraud

    African Journals Online (AJOL)

    Ethics CPD Supplement: Ethics in health care: Healthcare Fraud. S10. Vol 56 No 1 Supplement 1. S Afr Fam Pract 2014. Introduction. Vintage images are easily found depicting a virtuous doctor with a look of honesty and compassion on his or her face bending over a patient, stethoscope in hand, ready to perform a clinical ...

  14. Perceptions of Academic Staff towards Accommodating Students with Disabilities in a Civil Engineering Undergraduate Program in a University in South Africa

    Science.gov (United States)

    Mayat, Nafisa; Amosun, Seyi Ladele

    2011-01-01

    This study explored the perceptions of academic staff towards admission of students with disabilities, and their accommodation once accepted into an undergraduate Civil Engineering program in a South African university. Qualitative responses relating to the perceptions of five academic staff were obtained through semi-structured interviews. The…

  15. Gerundium: A Comprehensive Public Educational Program on Organ Donation and Transplantation and Civil Law in Hungary.

    Science.gov (United States)

    Kovács, D Á; Mihály, S; Rajczy, K; Zsom, L; Zádori, G; Fedor, R; Eszter, K; Enikő, B; Asztalos, L; Nemes, B

    2015-09-01

    Organ transplantation has become an organized, routine, widely used method in the treatment of several end-stage diseases. Kidney transplantation means the best life-quality and longest life expectancy for patients with end-stage renal diseases. Transplantation is the only available long-term medical treatment for patients with end-stage liver, heart, and lung diseases. Despite the number of transplantations increasing worldwide, the needs of the waiting lists remain below expectations. One of the few methods to increase the number of transplantations is public education. In cooperation with the University of Debrecen Institute for Surgery Department of Transplantation, the Hungarian National Blood Transfusion Service Organ Coordination Office, and the Local Committee Debrecen of Hungarian Medical Students' International Relations Committee (HuMSIRC), the Gerundium, a new educational program, has been established to serve this target. Gerundium is a special program designed especially for youth education. Peer education means that age-related medical student volunteers educate their peers during interactive unofficial sessions. Volunteers were trained during specially designed training. Medical students were honored by HuMSIRC, depending on their activity on the basis of their own regulations. Uniform slides and brochures to share were designed. Every Hungarian secondary school was informed. The Local Committee Budapest of HuMSIRC also joined the program, which helps to expand our activity throughout Hungary. The aim of the program is public education to help disperse disapproval, if presented. As a multiple effect, our program promotes medical students to have better skills in the field of transplantation, presentation, and communication skills. Our program is a voluntary program with strong professional support and is free of charge for the community. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. 30 CFR 947.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 947.845 Section 947.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE WASHINGTON § 947.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  17. 30 CFR 941.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 941.845 Section 941.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE SOUTH DAKOTA § 941.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  18. 30 CFR 912.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 912.845 Section 912.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE IDAHO § 912.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  19. 30 CFR 921.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 921.845 Section 921.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MASSACHUSETTS § 921.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  20. 30 CFR 939.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 939.845 Section 939.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE RHODE ISLAND § 939.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  1. 30 CFR 937.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 937.845 Section 937.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE OREGON § 937.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  2. 30 CFR 942.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 942.845 Section 942.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE TENNESSEE § 942.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  3. 30 CFR 903.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 903.845 Section 903.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE ARIZONA § 903.845 Civil penalties. Part 845 of this chapter, Civil Penalties, applies to the assessment of civil penalties for violations...

  4. 30 CFR 910.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 910.845 Section 910.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE GEORGIA § 910.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  5. 30 CFR 922.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 922.845 Section 922.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MICHIGAN § 922.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  6. 30 CFR 933.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 933.845 Section 933.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE NORTH CAROLINA § 933.845 Civil penalties. Part 845 of this chaper, Civil Penalties, shall apply when civil penalties are assessed for...

  7. 30 CFR 905.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 905.845 Section 905.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE CALIFORNIA § 905.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  8. Integrating ethical values into fraud triangle theory in assessing employee fraud: Evidence from the Malaysian banking industry

    Directory of Open Access Journals (Sweden)

    Jamaliah Said

    2017-06-01

    Full Text Available This study attempts to integrate ethical values into the fraud triangle theory in the context of Malaysian banking industry. Primary data were collected through the survey of 108 questionnaires administered to the employees of the top three largest banks in Malaysia. The findings revealed that ethical values were negatively related to employee fraud, and two elements of fraud triangle theory, namely, opportunity and rationalization, were positively related to employee fraud. This implies that high ethical value is crucial to mitigate employee fraud. To minimize employee fraud, the banking industry should reduce opportunities and employee negative rationalization through strong internal control. This study contributes to literature on the occurrences of employee fraud, which is not widely discussed, especially in the context of the banking industry in developing countries.

  9. Civil law

    NARCIS (Netherlands)

    Hesselink, M.W.; Gibbons, M.T.

    2014-01-01

    The concept of civil law has two distinct meanings. that is, disputes between private parties (individuals, corporations), as opposed to other branches of the law, such as administrative law or criminal law, which relate to disputes between individuals and the state. Second, the term civil law is

  10. Fraud and Misconduct in Medical Research

    Directory of Open Access Journals (Sweden)

    Ali Moghtaderi

    2012-03-01

    Full Text Available During the last year we had observed different types of misconduct in the submitted manuscripts into the editorial office. Those are included attempted theft of data, presence of ghost authors, gift authorship, dual submissions, salami publications, falsification and some other types of fraud. Our analysis in the editorial office led us to conclude that research fraud is an important issue and should be discussed clearly. The emphasis on competition and pressure to produce published materials, while internal intention to discover the scientific truth may foster a conflict between personal career goals and human intellectual motivation; finally may induce research misconduct. Having accurate and good knowledge in this field is mandatory for researchers especially the younger ones. In the first part of this article we will discuss a short but important part of the history of this problem and in the second part definition and editorial response will be reviewed

  11. Worries, uncertainties and questions of the civil society regarding the Romanian Nuclear Program

    International Nuclear Information System (INIS)

    Zamfir, I.

    1996-01-01

    The author presents a pleading for an extensive, open, public discussion of the government option favoring further development of nuclear power program in Romania, in spirit of the law of Environment Protection. Although experts in radiation protection and in the field of production and utilization of nuclear energy allegedly assure the lack of any risk in the operation of CANDU type reactors, they can not state for sure that the Cernavoda NPP is a success from the economic point of view either. At the same time, issues strongly connected to the nuclear power policy, like that of radioactive waste disposal, are not exposed to the public debate as being a secret. It is quoted a report of Green Peace Canada which states that the lifetime of the CANDU reactors is not in fact that initially estimated and also that many incidents were recorded so far in the operation of these reactors

  12. National Energy Board Emergency Management Program : annex to Natural Resources Canada Civil Emergency Plan no. 004

    International Nuclear Information System (INIS)

    Lever, G.; LeMay, R.

    2006-01-01

    As a matter of primary public interest, safety is included in the National Energy Board's (NEB) mandate. The Board is responsible for ensuring companies involved with energy development and pipelines comply with regulations concerning the safety of employees, the public, and the environment. The purpose of the NEB's Emergency Management Program is to establish a prompt and coordinated response to an emergency which occurs at any facility or operation regulated by the NEB; promote safety and security and assure compliance with regulatory requirements in order to protect the public, workers, property and the environment during the life cycle of facilities and operations; and, have a documented set of procedures that accomplish these objectives. The Board ensures that companies identify and manage the potential hazards associated with their facilities; conduct a risk analysis of those hazards; and, manage the risks in order to protect the public and personnel, the security of the facilities and the environment. All companies under the Board's jurisdiction are responsible for developing and maintaining an Emergency Response and Preparedness Program for all aspects of their operations. In the event an emergency occurs, the regulated company is responsible for responding to the emergency and coordinating emergency response activities. Typically, the NEB responds on site to incidents that result in death or serious injury; involve a significant release of hydrocarbons; could result in potential or real impact due to loss of service; pose imminent threats identified by Public Safety and Emergency Preparedness Canada or other agencies; attract significant media attention, or on the advice of Natural Resources Canada or other federal Agencies. The first part of this document described the initial response check list while the second part outlined the Emergency response framework. 2 tabs., 3 figs., 15 appendices

  13. Characterizing Durations of Heroin Abstinence in the California Civil Addict Program: Results From a 33-Year Observational Cohort Study

    Science.gov (United States)

    Nosyk, Bohdan; Anglin, M. Douglas; Brecht, Mary-Lynn; Lima, Viviane Dias; Hser, Yih-Ing

    2013-01-01

    In accordance with the chronic disease model of opioid dependence, cessation is often observed as a longitudinal process rather than a discrete endpoint. We aimed to characterize and identify predictors of periods of heroin abstinence in the natural history of recovery from opioid dependence. Data were collected on participants from California who were enrolled in the Civil Addict Program from 1962 onward by use of a natural history interview. Multivariate regression using proportional hazards frailty models was applied to identify independent predictors and correlates of repeated abstinence episode durations. Among 471 heroin-dependent males, 387 (82.2%) reported 932 abstinence episodes, 60.3% of which lasted at least 1 year. Multivariate analysis revealed several important findings. First, demographic factors such as age and ethnicity did not explain variation in durations of abstinence episodes. However, employment and lower drug use severity predicted longer episodes. Second, abstinence durations were longer following sustained treatment versus incarceration. Third, individuals with multiple abstinence episodes remained abstinent for longer durations in successive episodes. Finally, abstinence episodes initiated >10 and ≤20 years after first use lasted longer than others. Public policy facilitating engagement of opioid-dependent individuals in maintenance-oriented drug treatment and employment is recommended to achieve and sustain opioid abstinence. PMID:23445901

  14. The Road from Foolishness to Fraud

    Science.gov (United States)

    Park, R. L.

    2000-12-01

    Ancient beliefs in demons and magic still sweep across the modern landscape, but they are now dressed in the language and symbols of science. This is pseudoscience. At least in the beginning, its practitioners may believe it to be science, just as witches and faith healers may truly believe they can call forth supernatural powers. What may begin as honest error, however, has a way of evolving through almost imperceptible steps from self-delusion to fraud.

  15. TAX EVASION BETWEEN FRAUD AND OPTIMIZATION

    Directory of Open Access Journals (Sweden)

    Emilia Cornelia STOICA

    2017-05-01

    Full Text Available Tax optimization, often called legal tax evasion is the use of methods and techniques that are within the law, in order to reduce or even cancel the tax liability. To achieve such an approach, the taxpayer or his advisers must know in depth the tax law - and by extension, the financial and administrative law - and, moreover, must be functional tax jurisdictions which allow the use of appropriate assemblies. The recent leasks, as WikiLeaks, LuxLeaks, SwissLeaks, Panama Papers etc. on financial flows to tax havens highlight the far-reaching unprecedented evasion and tax fraud, both in the amounts involved - trillions of dollars - and sophisticated assemblies used primarily by multinational companies to the detriment of the public finances of Member territory headquarters and branches which are located and, therefore, detrimental economic and social life of those countries. Tax evasion is based on legal mechanisms which, combined together in the montages of increasingly complex, allowing operators, mostly multinational legal entities to circumvent national tax law and not pay the taxes due. The border between tax optimization, tax evasion and fraud is very thin, optimization using various legal methods to reduce the tax owed, whereas tax evasion using illegal means, which covered crime. Tax evasion reveals either optimize or fraud. There is a significant international dimension of tax evasion because it is favored by multinational corporations operating conditions.

  16. THE FORENSIC ACCOUNTING AND CORPORATE FRAUD

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    2013-04-01

    Full Text Available This study is aimed at analyzing the characteristics of forensic accounting services performed by the accounting firms in Brazil, using an exploratory approach. At the end, performs a discourse analysis on a speech proffered by the CEO of one of the key players of forensic accounting service provider (Kroll in Brazil. In order to orientate this reflection, we pose the following question: what is the characteristic of forensic accounting that substantiates it as professional accountants’ innovation to curb corporate accounting malpractices? In this intent, we accept the premise that the bone of contention in some unhealthy business environment is the inability of auditor to track frauds. We used the icons (categories and/or nodes that dynamically represent formalism in the theory of self re-production to explain the patterns met in the speech. Our finding makes us to conclude that the idea that frauds have been least detected by auditors begins to gain shape as auditors are more adequately trained to detect fraud instead of emphasizing the traditional segregation of duties and safeguard of assets.

  17. FISCAL FRAUD IN TEXTILE AND CLOTHING IMPORTS

    Directory of Open Access Journals (Sweden)

    STANCIU Dorică

    2015-05-01

    Full Text Available We have appreciated that this paper can be structured in four chapters that will explain the inevitable negative effects generated by tax and fiscal fraud, which are felt in the level of fiscal revenue, determining major malfunctions in the mechanism of the markets. In the economic reality and in the rise of the tax fraud phenomenon, in the contemporary fiscal doctrine it is stated that the public desiderate of “loyal collaboration between the tax payer and the revenue agency” with the purpose of correctly setting taxes and tariffs and other required fund needed for creating public interest monetary funds. The economic, social and political globalization tendencies of the last decade have stimulated and supported actions relating to eluding the fiscal dispositions, actions which have moved more and more from the center of the national fiscal system towards the exterior, outside the field of action of the national fiscal law. In this regard show that reducing fiscal evasion, allows the creation of budgetary resources, necessary for funds allocation for economical growth. In Romania, one of the basic economic problems is the lack of investment resources allocated, these being the main contributor to economic growth, in which the reduction of fraud and tax evasion is the solution to increase this allocation which can be rated as one of the priority tasks of the state.

  18. The expanding role of civil society in the global HIV/AIDS response: what has the President's Emergency Program For AIDS Relief's role been?

    Science.gov (United States)

    Coutinho, Alex; Roxo, Uchechi; Epino, Henry; Muganzi, Alex; Dorward, Emily; Pick, Billy

    2012-08-15

    Civil society has been part of the HIV/AIDS response from the very beginning of the epidemic, often becoming engaged before national governments. Traditional roles of civil society--advocacy, activism, serving as government watchdog, and acting as community caretaker--have been critical to the response. In addition, civil society organizations (CSOs) play an integral part in providing world-class HIV prevention and treatment services and helping to ensure continuity of care. The President's Emergency Program for AIDS Relief (PEPFAR) has significantly increased the global scale-up of combination antiretroviral therapy reaching for more than 5 million people in developing countries, as well as implementation of effective evidence-based combination prevention approaches. PEPFAR databases in 5 countries and annual reports from a centrally managed initiative were mined and analyzed to determine the numbers and types of CSOs funded by PEPFAR over a 5-year period (2006-2011). Data are also presented from Uganda showing the overall resource growth in CSO working for HIV. Case studies document the evolution of 3 indigenous CSOs that increased the capacity to implement activities with PEPFAR funding. A legacy of PEPFAR has been the growth of civil society to address social and health issues as well as recognition by governments that partnerships with beneficiaries and civil society result in better outcomes. Scale-up of the global response could not have happened without the involvement of civil society and people living with HIV. This game changing partnership to jointly tackle the problems that countries face may well be the greatest benefit emerging from the HIV epidemic.

  19. SPECIFIC MECHANISMS AND METHODS FOR ESTIMATING TAX FRAUD

    Directory of Open Access Journals (Sweden)

    Brindusa Tudose

    2016-12-01

    Full Text Available In the last decades, tax fraud has grown, being catalogued as a serious impediment in the way of economic development. The paper aims to make contributions on two levels: a Theoretical level - by synthesis methodologies for estimating tax fraud and b Empirical level - by analyzing fraud mechanisms and dynamics of this phenomenon, properly established methodologies. To achieve the objective, we have appealed to the qualitative and quantitative analysis. Whatever the context that generates tax fraud mechanisms, the ultimate goal of fraudsters is the same: total or partial avoidance of taxation, respectively obtaining public funds unduly. The increasing complexity of business (regarded as a tax base and failure to adapt prompt of legal regulations to new contexts have allowed diversification and “improving” the mechanisms of fraud, creating additional risks for accuracy estimates of tax fraud.

  20. CONSEQUENCES OF FRAUD AT THE PRESENTATION OF THE FINANCIAL STATEMENTS

    Directory of Open Access Journals (Sweden)

    Florentina Istrate

    2017-12-01

    Full Text Available The field of tax evasion has generally been the subject of research at different levels on a number of occasions. However, reality demonstrates that tax fraud today is far from being properly and completely perceived, so the mechanisms designed to prevent and combat it are far from being effective.Tax evasion is a very difficult concept to express, and there is no clear definition of tax fraud. When it comes to fraud, there is also talk of legal or legitimate fraud, illegal fraud, international evasion, legal and illegal evasion, tax havens or refugees, abuse of the right to flee to the tax, freedom to choose the least taxed way, or fiscal underestimation, law fraud or underground economy.

  1. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  2. Decision Tree Approach to Discovering Fraud in Leasing Agreements

    OpenAIRE

    Horvat Ivan; Pejić Bach Mirjana; Merkač Skok Marjana

    2014-01-01

    Background: Fraud attempts create large losses for financing subjects in modern economies. At the same time, leasing agreements have become more and more popular as a means of financing objects such as machinery and vehicles, but are more vulnerable to fraud attempts. Objectives: The goal of the paper is to estimate the usability of the data mining approach in discovering fraud in leasing agreements. Methods/Approach: Real-world data from one Croatian leasing firm was used for creating tow mo...

  3. An Analysis of Internal Controls and Procurement Fraud Deterrence

    Science.gov (United States)

    2013-12-01

    might keep the organization from achieving its objectives and analyze risks , including fraud risk , so as to decide how the risk should be managed ( COSO ...internal control to adequately manage the risk ( COSO , 2013). Risk management involves developing the effective internal control targeted at a...structure and management . While the risk of fraud cannot be eliminated entirely, it can be greatly reduced with an appropriate procurement fraud prevention

  4. Survey of Insurance Fraud Detection Using Data Mining Techniques

    OpenAIRE

    Sithic, H. Lookman; Balasubramanian, T.

    2013-01-01

    With an increase in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection has become an emerging topics of great importance for academics, research and industries. Financial fraud is a deliberate act that is contrary to law, rule or policy with intent to obtain unauthorized financial benefit and intentional misstatements or omission of amounts by deceiving users of financial statements, especially investors and creditors. Data mining tec...

  5. Stateless Puzzles for Real Time Online Fraud Preemption

    OpenAIRE

    Rahman, Mizanur; Recabarren, Ruben; Carbunar, Bogdan; Lee, Dongwon

    2017-01-01

    The profitability of fraud in online systems such as app markets and social networks marks the failure of existing defense mechanisms. In this paper, we propose FraudSys, a real-time fraud preemption approach that imposes Bitcoin-inspired computational puzzles on the devices that post online system activities, such as reviews and likes. We introduce and leverage several novel concepts that include (i) stateless, verifiable computational puzzles, that impose minimal performance overhead, but e...

  6. Detection of Fraud in Audit and Forensic Investigation

    OpenAIRE

    Kupková, Barbora

    2011-01-01

    Economic crime is always actual theme, even more when economy finds itself in crisis. It is a well-known fact, that in such times fraud risk increases even inside organizations. This thesis is dealing with economic crime from the perspective of auditor and fraud examiner and likewise in the terms of Czech criminal law. Fraud, as both professions call economic criminality, implies higher costs for organizations, that's why both private and government sector organizations strives to fight it. S...

  7. Identifying frauds and anomalies in Medicare-B dataset.

    Science.gov (United States)

    Jiwon Seo; Mendelevitch, Ofer

    2017-07-01

    Healthcare industry is growing at a rapid rate to reach a market value of $7 trillion dollars world wide. At the same time, fraud in healthcare is becoming a serious problem, amounting to 5% of the total healthcare spending, or $100 billion dollars each year in US. Manually detecting healthcare fraud requires much effort. Recently, machine learning and data mining techniques are applied to automatically detect healthcare frauds. This paper proposes a novel PageRank-based algorithm to detect healthcare frauds and anomalies. We apply the algorithm to Medicare-B dataset, a real-life data with 10 million healthcare insurance claims. The algorithm successfully identifies tens of previously unreported anomalies.

  8. Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection

    Science.gov (United States)

    Flegel, Ulrich; Kerschbaum, Florian; Miseldine, Philip; Monakova, Ganna; Wacker, Richard; Leymann, Frank

    One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered. They circumvent internal controls in place to prevent this kind of fraud, such as a goods receipt, e.g., by ordering services instead of goods. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud, but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.

  9. Fraud Risk Factors and Audit Programme Modifications: Evidence from Jordan

    Directory of Open Access Journals (Sweden)

    Modar Abdullatif

    2013-03-01

    Full Text Available This study explores how audit firms in Jordan deal with the presence of fraud risk factors in audit clients. In doing so, the study seeks to explore which fraud risk factors are more important to Jordanianauditors, and how Jordanian auditors consider modifying their audit programmes when fraud risk factors are present in clients. The study uses a structured questionnaire that was administered to seniorlevel auditors in the largest Jordanian audit firms. The findings show that almost all of the 20 fraud risk factors included in the questionnaire were only slightly important (if not unimportant, a finding that is arguably alarming. The perceived importance of modifying the audit programme in the presence of each fraud risk factor was related to the perceived importance of the fraud risk factor itself. However, changes in the nature and extent of audit procedures were more important than changes in the timing of the procedures or the members of the audit team. The most important fraud risk factors were related to the characteristics of management and its attitude towards the audit, while the least important fraud risk factors were related to the difficulties in the client’s financial performance. Factor analysis found that the fraud risk factors could be classified into four separate groups. Possible interpretations of the findings were discussed, such as considering the Jordanian business environment characteristics, and the findings were compared to those of extant international studies.

  10. 7 CFR 761.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Civil rights. 761.3 Section 761.3 Agriculture... SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION General Provisions § 761.3 Civil rights. Part 15d of this title contains applicable regulations pertaining to civil rights and filing of discrimination complaints...

  11. 32 CFR 310.46 - Civil actions.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil actions. 310.46 Section 310.46 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.46 Civil actions. An individual may file a civil suit...

  12. Civil Society

    Science.gov (United States)

    Social Media Facebook @oasofficial Facebook Twitter @oas_official Twitter Newsletters Documents OAS Technology Social Development Summits of the Americas Sustainable Development T Telecommunications Terrorism Tourism Trade Treaties and Agreements W Women Y Youth Strategic Partners Permanent Observers Civil Society

  13. Civil War

    OpenAIRE

    Christopher Blattman; Edward Miguel

    2010-01-01

    Most nations have experienced an internal armed conflict since 1960. The past decade has witnessed an explosion of research into the causes and consequences of civil wars, belatedly bringing the topic into the economics mainstream. This article critically reviews this interdisciplinary literature and charts productive paths forward. Formal theory has focused on a central puzzle: why do civil wars occur at all when, given the high costs of war, groups have every incentive to reach an agreement...

  14. Space Civil Engineering option - A progress report

    Science.gov (United States)

    Criswell, Marvin E.; Sadeh, Willy Z.

    1992-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding Civil Engineering to the development, operation, and maintenance of infrastructures on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University and with support of the NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts and the current status of the curriculum in the Space Civil Engineering Option primarily at the undergraduate level are presented.

  15. Using Nuclear Techniques to Combat Food Fraud

    International Nuclear Information System (INIS)

    Frew, Russell; Cannavan, Andrew

    2015-01-01

    Horse meat in your beef burger. Melamine in milk powder. Dilution of your superior-quality honey, whiskey, fruit juice or rice with inferior substitutes. Reports of food fraud make regular headlines in the media, but how big is the problem? It is very difficult to say because one of the objectives of the deception perpetrated on consumers is to avoid detection, but an estimate by the World Customs Organisation puts the cost of food fraud at US $49 billion annually. There are many different types of food fraud, but two have particular food safety implications; economically motivated adulteration (EMA), and substitution. A Federal Register Notice 2 of a 2009 FDA Open Meeting defines EMA as “The fraudulent, intentional substitution or addition of a substance in a product for the purpose of increasing the apparent value of the product or reducing the cost of its production, i.e., for economic gain. EMA includes dilution of products with increased quantities of an already-present substance (e.g., increasing inactive ingredients of a drug with a resulting reduction in strength of the finished product, or watering down of juice) to the extent that such dilution poses a known or possible health risk to consumers, as well as the addition or substitution of substances in order to mask dilution.” The investment by producers in technology to ensure safety and quality should result in higher prices and greater market access for their produce. The higher prices, however, provide the motivation for fraudsters. When a fraudster puts a genuine producer’s label on a cheaper product to pass it off as the higher quality article the result is, at the very least, a loss of sale for the genuine producer. If the consumer has a bad experience with the item, brand damage will result and possibly even liability for recall or response

  16. Cyber fraud tactics, techniques and procedures

    CERN Document Server

    Howard, Rick

    2009-01-01

    Written and edited by known experts in the field, the content is indeed of high quality and very informative. The logical structure and writing style are excellent, which is a challenging task when there are so many contributors. The book is a must-read for several reader categories. I strongly recommend some of the technical chapters to advanced undergraduate and graduate computer science students. Law students can use the book to grasp the necessary technical background material for investigating cyber fraud. Finally, it is also for readers who wish to learn about the current state of

  17. Detector de fraude académico

    OpenAIRE

    Aranda de Miguel, Jorge

    2014-01-01

    RESUMEN: En la actualidad, el fraude académico constituye un serio problema para toda la comunidad universitaria. Herramientas de detección automatizadas pueden ser de gran utilidad para los docentes a la hora de detectar estos casos. El objeto de estudio de este proyecto es tratar de conocer la mejor manera de resolver el problema de la detección del plagio, así como conocer y explicar las diversas técnicas conocidas que existen para analizar el lenguaje humano y lenguajes de programación...

  18. Civil Engineering Technology Needs Assessment.

    Science.gov (United States)

    Oakland Community Coll., Farmington, MI. Office of Institutional Planning and Analysis.

    In 1991, a study was conducted by Oakland Community College (OCC) to evaluate the need for a proposed Civil Engineering Technology program. An initial examination of the literature focused on industry needs and the job market for civil engineering technicians. In order to gather information on local area employers' hiring practices and needs, a…

  19. Categorizing and Describing the Types of Fraud in Healthcare

    NARCIS (Netherlands)

    Thornton, Dallas; Brinkhuis, Michel; Amrit, Chintan; Aly, Robin

    2015-01-01

    Today, the over $2 trillion US healthcare system is ravaged by fraud, waste, and abuse, with an estimated one-third of all these costs frivolously spent in such ways. Sun Tzu wrote, "Every battle is won or lost before it's ever fought." To combat healthcare fraud, we must understand it and the forms

  20. 29 CFR 453.12 - Meaning of fraud or dishonesty.

    Science.gov (United States)

    2010-07-01

    ... STANDARDS GENERAL STATEMENT CONCERNING THE BONDING REQUIREMENTS OF THE LABOR-MANAGEMENT REPORTING AND DISCLOSURE ACT OF 1959 Scope of the Bond § 453.12 Meaning of fraud or dishonesty. The term “fraud or dishonesty” shall be deemed to encompass all those risks of loss that might arise through dishonest or...

  1. Fraud and Fraudulent Practices in Nigeria Banking Industry ...

    African Journals Online (AJOL)

    The paper reviews the various forms of fraudulent practice their impact and inducement for various reforms in banking industry. It also mentions various legislations targeted at reducing fraud and introducing some forms of control and reporting systems. Various theories of fraud are examined and detailed analysis of various ...

  2. 20 CFR 410.699a - Penalties for fraud.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Penalties for fraud. 410.699a Section 410.699a Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969... Review, Finality of Decisions, and Representation of Parties § 410.699a Penalties for fraud. The penalty...

  3. Factors Responsible for Students' Involvement in Internet Fraud as ...

    African Journals Online (AJOL)

    Internet fraud is one of the most rapidly increasing forms of cybercrime. It has become rampant among students generally because they make use of different Internet devices in schools. The purpose of this study was to examine the factors responsible for students' involvement in Internet fraud as expressed by tertiary ...

  4. Big data based fraud risk management at Alibaba

    Directory of Open Access Journals (Sweden)

    Jidong Chen

    2015-12-01

    Full Text Available With development of mobile internet and finance, fraud risk comes in all shapes and sizes. This paper is to introduce the Fraud Risk Management at Alibaba under big data. Alibaba has built a fraud risk monitoring and management system based on real-time big data processing and intelligent risk models. It captures fraud signals directly from huge amount data of user behaviors and network, analyzes them in real-time using machine learning, and accurately predicts the bad users and transactions. To extend the fraud risk prevention ability to external customers, Alibaba also built up a big data based fraud prevention product called AntBuckler. AntBuckler aims to identify and prevent all flavors of malicious behaviors with flexibility and intelligence for online merchants and banks. By combining large amount data of Alibaba and customers', AntBuckler uses the RAIN score engine to quantify risk levels of users or transactions for fraud prevention. It also has a user-friendly visualization UI with risk scores, top reasons and fraud connections.

  5. BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

    Directory of Open Access Journals (Sweden)

    V. Dheepa

    2012-07-01

    Full Text Available Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one. Due to the increase of credit card usage, the frauds associated with this have also increased. There are a lot of approaches used to detect the frauds. In this paper, behavior based classification approach using Support Vector Machines are employed and efficient feature extraction method also adopted. If any discrepancies occur in the behaviors transaction pattern then it is predicted as suspicious and taken for further consideration to find the frauds. Generally credit card fraud detection problem suffers from a large amount of data, which is rectified by the proposed method. Achieving finest accuracy, high fraud catching rate and low false alarms are the main tasks of this approach.

  6. Corporate fraud and bank loans:Evidence from china

    Institute of Scientific and Technical Information of China (English)

    Yunsen; Chen; Song; Zhu; Yutao; Wang

    2011-01-01

    Receiving punishment from regulators for corporate fraud can affect financing contracts between a firm and its bank,as both the firm’s credit risk and information risk increase after punishment By focusing on Chinese firms’borrowing behavior after events of corporate fraud,we find that firms’bank loans after punishment are not only significantly lower,but are also less than those for non-fraudulent firms.In addition,loan interest rates after punishment are not only higher than before,but also higher than those for their non-fraudulent counterparts.In addition,we find that corporate fraud indirectly destabilizes the"performance-bank loan"relationship.Our results suggest that corporate fraud negatively affects a firm’s ability to source debt financing,which provides new evidence about the economic consequences of fraud.

  7. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  8. Corporate fraud and bank loans: Evidence from china

    Directory of Open Access Journals (Sweden)

    Yunsen Chen

    2011-09-01

    Full Text Available Receiving punishment from regulators for corporate fraud can affect financing contracts between a firm and its bank, as both the firm’s credit risk and information risk increase after punishment. By focusing on Chinese firms’ borrowing behavior after events of corporate fraud, we find that firms’ bank loans after punishment are not only significantly lower, but are also less than those for non-fraudulent firms. In addition, loan interest rates after punishment are not only higher than before, but also higher than those for their non-fraudulent counterparts. In addition, we find that corporate fraud indirectly destabilizes the “performance-bank loan” relationship. Our results suggest that corporate fraud negatively affects a firm’s ability to source debt financing, which provides new evidence about the economic consequences of fraud.

  9. Civil Disobedience.

    Science.gov (United States)

    Martz, Carlton

    2000-01-01

    This theme issue looks at three historical and recent instances of civil disobedience. The first article examines the Free Speech Movement, which arose on the Berkeley campus of the University of California in the 1960s. The second article recounts the struggle of Mahatma Gandhi to free India from the British Empire. The final article explores the…

  10. 7 CFR 1709.18 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Civil rights. 1709.18 Section 1709.18 Agriculture... ASSISTANCE TO HIGH ENERGY COST COMMUNITIES General Requirements § 1709.18 Civil rights. This program will be administered in accordance with applicable Federal Civil Rights Law. All grants made under this subpart are...

  11. 50 CFR 401.22 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil rights. 401.22 Section 401.22..., DEVELOPMENT AND ENHANCEMENT § 401.22 Civil rights. Each application for Federal assistance, grant-in-aid award... Assisted Programs of the Civil Rights Act of 1964 and with the Secretary's regulations promulgated...

  12. Neural fraud detection in credit card operations.

    Science.gov (United States)

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.

  13. MAPPING FRAUD RISK IN FINANCIAL AUDIT – SALES OPERATIONS

    Directory of Open Access Journals (Sweden)

    Ioan RADU

    2013-10-01

    Full Text Available This paper provides an effective tool «fraud risk map« for organizations and auditors in mathematic assessment procedures, with real, tangible results, regarding the organization’s fraud risk exposure. Overcoming the fade and purely theoretical risk assessment methods («based on professional judgement – risk: high, medium, low«, the paper presents risk indicators as warning signals and quantitative and qualitative methods for risk assessment. Illustrating scalability methods and developping a practical tools for material misstatement of the economic entity financial statements, the case study presented, on sales operations, brigs added value to auditors work in the fraud risk assessment procedures.

  14. PENGARUH PELAKSANAAN RISK BASED INTERNAL AUDITING TERHADAP PENCEGAHAN FRAUD

    Directory of Open Access Journals (Sweden)

    Rozmita Dewi Yuniarti Rozali

    2015-12-01

    Full Text Available This study aims to determine the effect of implementation of risk based internal auditing on fraud prevention on internal audit Inspection Office Bank BRI Bandung Region. The sample used by 18 internal auditors in Inspection Office of Bank BRI Bandung Region saturated sampling method. Based on calculation of simple regression analysis obtained result that every increase of implementation of risk based internal auditing (X will lead to increase fraud prevention (Y. It shows that there is a positive influence between the implementation of risk based internal auditing on fraud prevention on the internal audit of Inspection Office of Bank BRI Bandung Region.

  15. Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services

    DEFF Research Database (Denmark)

    Yesuf, Ahmed; Wolos, Lars Peter; Rannenberg, Kai

    2017-01-01

    Telecom providers are losing tremendous amounts of money due to fraud risks posed to Telecom services and products. Currently, they are mainly focusing on fraud detection approaches to reduce the impact of fraud risks against their services. However, fraud prevention approaches should also...... be investigated in order to further reduce fraud risks and improve the revenue of Telecom providers. Fraud risk modelling is a fraud prevention approach aims at identifying the potential fraud risks, estimating the damage and setting up preventive mechanisms before the fraud risks lead to actual losses....... In this paper, we highlight the important requirements for a usable and context-aware fraud risk modelling approach for Telecom services. To do so, we have conducted two workshops with experts from a Telecom provider and experts from multi-disciplinary areas. In order to show and document the requirements, we...

  16. Types of fraud in meat and meat products: a review

    Directory of Open Access Journals (Sweden)

    Espinoza T.

    2015-09-01

    Full Text Available Affects the food control. The globalization, increased imports and exports and free trade agreements have led to greater sharing and access to food worldwide; along with it, the problems associated with fraud such as adulteration, substitution, intentionality, and counterfeiting have been increased. Therefore, there are various tasks associated with food fraud, which in most reviews published only new identification techniques have been discussed. However, a discussion about the types of fraud and its impact on society, bioterrorism and religion, has been little commented. This review focuses primarily on describing the types of fraud that has as objective to obtain economic benefit or cause terrorism. Also, latest techniques available for detecting meat adulteration are mentioned.

  17. Corruption and internal fraud in the Turkish construction industry.

    Science.gov (United States)

    Gunduz, Murat; Önder, Oytun

    2013-06-01

    The purpose of this paper is to develop an understanding about the internal fraud and corruption problem in the Turkish construction industry. The reasons behind the internal fraud and corruption problem as well as the types of prevention methods were investigated; and as a result various recommendations were made. To this end, a risk awareness questionnaire was used to understand the behavioral patterns of the construction industry, and to clarify possible proactive and reactive measures against internal fraud and corruption. The type of fraud experienced by Turkish construction companies was also surveyed in the questionnaire. The questionnaire was sent to 89 firms; and depending on the collected data, certain recommendations for construction industry professionals were provided.

  18. NEW FOOD FRAUDS IN SEAFOOD CHAIN: TUB GURNARD OR PANGASIUS?

    Directory of Open Access Journals (Sweden)

    M. C. Campagna

    2011-04-01

    Full Text Available The present study reports a case of food fraud occurred in the Lazio region. Using the Isoelectrofocusing we revealed the substitution of tub-gurnard, with the less valuable commercial fish, pangasius.

  19. Application of Data Mining for Card Fraud Detection

    Directory of Open Access Journals (Sweden)

    I.V. Andrianov

    2012-03-01

    Full Text Available This paper focuses on implementing Data Mining methods for card fraud detection. The approach to classification and prediction tasks for detection of unauthorized transactions is considered.

  20. Gendered alternative to cyber fraud participation: an assessment of ...

    African Journals Online (AJOL)

    Gendered alternative to cyber fraud participation: an assessment of technological driven crime in Lagos State, Nigeria. Ajibade Ebenezer Jegede, Ayotunde Oluwadamilola Elegbeleye, Elizabeth Ibunkunoluwa Olowookere, Bankole Roberts Olorunyomi ...

  1. Software agent Technology: A Framework for Minimizing Fraud in ...

    African Journals Online (AJOL)

    Software agent Technology: A Framework for Minimizing Fraud in Postpaid Billing Systems. ... Journal of Research in National Development ... to the traditional Object-oriented Software engineering methodology was used to come up with this ...

  2. IDENTITY FRAUD: Prevalence and Links to Alien Illegal Activities

    National Research Council Canada - National Science Library

    2002-01-01

    To discuss the significance of "identity fraud"-a term that encompasses a broad range of illegal activities based on fraudulent use of identifying information of a real person or of a fictitious person...

  3. The role of power in financial statement fraud schemes

    OpenAIRE

    Albrecht, Chad; Holland, Daniel; Malagueño, Ricardo; Dolan, Simon; Tzafrir, Shay

    2015-01-01

    In this paper, we investigate a large-scale financial statement fraud to better understand the process by which individuals are recruited to participate in financial statement fraud schemes. The case reveals that perpetrators often use power to recruit others to participate in fraudulent acts. To illustrate how power is used, we propose a model, based upon the classical French and Raven taxonomy of power, that explains how one individual influences another individual to participate in financi...

  4. Identifying Bank Frauds Using CRISP-DM and Decision Trees

    OpenAIRE

    Bruno Carneiro da Rocha; Rafael Timóteo de Sousa Júnior

    2010-01-01

    This article aims to evaluate the use of techniques of decision trees, in conjunction with the managementmodel CRISP-DM, to help in the prevention of bank fraud. This article offers a study on decision trees, animportant concept in the field of artificial intelligence. The study is focused on discussing how these treesare able to assist in the decision making process of identifying frauds by the analysis of informationregarding bank transactions. This information is captured with the use of t...

  5. PENGARUH PROFESIONALISME AUDITOR INTERNAL TERHADAP PENCEGAHAN DAN PENDETEKSIAN KECURANGAN (FRAUD

    Directory of Open Access Journals (Sweden)

    Mimin Widaningsih

    2015-04-01

    The results showed that the influence of professionalism of internal auditor to fraud prevention is 40.07%, and the rest of 59.93% can be influenced by other variables that are not examined. And the amount of influence of professionalism of internal auditors to the detection of fraud is 37.33%, the rest of 62.67% can be influenced by other variables that are not examined.

  6. Beyond the anti-kickback statute: new entities, new theories in healthcare fraud prosecutions.

    Science.gov (United States)

    Sheehan, James G; Goldner, Jesse A

    2007-01-01

    The authors analyze existing and developing trends in healthcare fraud litigation. They first review the traditional use of the Medicare-Medicaid Anti-Kickback Statute to prosecute such fraudulent activity. They then consider newer theories that have been employed, or may be employed, in cases involving payors, middlemen, agents, and fiduciaries. These include the use of the Civil False Claims Act, the Federal Travel Act, and the Public Contracts Anti-Kickback (sometimes incorporating violations under state commercial bribery and similar state legislation to form the basis of a federal claim or prosecution). The Article then turns to a discussion and warning of attorneys' potential liability for a client's kickback arrangements. Finally, the Article takes a very brief look at relationships under Medicare Part D that may well prove to be a fertile area of problematic conduct, public and congressional scrutiny, and prosecutions utilizing some of these theories.

  7. Les attitudes sont-elles différentes face à la fraude fiscale et à la fraude sociale ?

    OpenAIRE

    Mathieu Lefebvre; Pierre Pestieau; Arno Riedl; Marie Claire Villeval

    2014-01-01

    En période de crise économique, les besoins de l’Etat augmentent et l’assiette fiscale se réduit ; il est alors courant de voir resurgir dans le débat public la lutte contre les diverses formes de fraude qui reduisent les recettes publiques. Dans ce contexte, on oppose régulièrement fraude fiscale à fraude sociale et la discussion porte souvent sur l’importance relative de l’une et de l’autre. On entend par fraude fiscale le détournement illégal d’un système fiscal afin de ne pas contribuer a...

  8. The role of management accounting in fraud control: The case of the City of Joondalup

    Directory of Open Access Journals (Sweden)

    Roney Oommen

    2015-11-01

    Full Text Available The 2014 ‘Report to the Nations on Occupational Fraud and Abuse’ released by the Association of Certified Fraud Examiners estimates that the potential projected losses from occupational fraud globally could run as high as US$3.7 trillion every year. In Australia, several studies have found that the Australian public sector entities are also significantly exposed to fraud. This article considers the case of the Australian City of Joondalup and asks whether its management accounting function can provide city management with the necessary data to enable effective control over occupational fraud and whether fraud control activities specifically directed towards fraud control can be a regular feature thereof. It is concluded that although aspects of fraud control are encompassed within the broader strategies of the City, it can significantly enhance its ability to control occupational fraud by leveraging its regular management reporting and analysis function.

  9. 32 CFR 310.47 - Civil remedies.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil remedies. 310.47 Section 310.47 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.47 Civil remedies. In addition to specific remedial...

  10. ACCOUNTING FRAUD AND CHARACTERISTICS OF COMPANY EXECUTIVES: AN EMPIRICAL INVESTIGATION

    Directory of Open Access Journals (Sweden)

    Maria BAXEVANI

    2014-11-01

    Full Text Available This study examines accounting fraud in relation to the characteristics of company executives. The study portrays the degree to which company as well as personal motives could urge an executive to commit fraud. Subsequently, we attempt to identify the degree to which certain socio-economic factors and the existence of strong internal audit mechanisms act as deterrence agents. Furthermore, we investigate the personal financial gain in relation to annual income as a motivator to commit fraud. Finally, we examine the optimal imprisonment duration as a deterrent and the overall probability to commit fraud. The research method was based in the distribution of a questionnaire and took place in the city of Thessaloniki and the region of West Macedonia and Thessaly. The participants were executives in the banking, financial and insurance sector. Our findings show that it is mostly personal factors that motivate an executive to commit fraud, but the fear of immediate legal sanctions and the existence of strong internal audit mechanisms are effective deterrence agents.

  11. Decision Tree Approach to Discovering Fraud in Leasing Agreements

    Directory of Open Access Journals (Sweden)

    Horvat Ivan

    2014-09-01

    Full Text Available Background: Fraud attempts create large losses for financing subjects in modern economies. At the same time, leasing agreements have become more and more popular as a means of financing objects such as machinery and vehicles, but are more vulnerable to fraud attempts. Objectives: The goal of the paper is to estimate the usability of the data mining approach in discovering fraud in leasing agreements. Methods/Approach: Real-world data from one Croatian leasing firm was used for creating tow models for fraud detection in leasing. The decision tree method was used for creating a classification model, and the CHAID algorithm was deployed. Results: The decision tree model has indicated that the object of the leasing agreement had the strongest impact on the probability of fraud. Conclusions: In order to enhance the probability of the developed model, it would be necessary to develop software that would enable automated, quick and transparent retrieval of data from the system, processing according to the rules and displaying the results in multiple categories.

  12. Pendeteksian Kecurangan (Fraud Laporan Keuangan oleh Auditor Eksternal

    Directory of Open Access Journals (Sweden)

    Tri Ramaraya Koroy

    2008-01-01

    Full Text Available Objectives of this paper are to identify and describe the problems in detecting the financial statement fraud in auditing financial statements by external auditors. Although detection of fraud is important to enhance the value of auditing, there are many problems that impede the appropriate implementation of detection. Based on review of related research that have bee done, there are four factors that identified in this paper. First, the characteristic of fraud occurence made it difficult for detection process. Second, auditing standards is not sufficiently supporst the proper detection. Third, work environment of audit may reduce the quality and the last, audit methods and procedures are not enough for efective detection. Based on this identified problems, the improvement of implementation was suggested. Abstract in Bahasa Indonesia: Tujuan makalah ini adalah mengidentifikasi dan menguraikan permasalahan dalam pendeteksian kecurangan dalam audit atas laporan keuangan oleh auditor eksternal. Meskipun pendeteksian kecurangan penting untuk meningkatkan nilai pengauditan, namun terdapat banyak masalah yang dapat menghalangi implementasi dari pendeteksian yang tepat. Berdasarkan telaah atas berbagai penelitian yang telah dilakukan, ada terdapat empat faktor penyebab besar yang diidentifikasikan melalui makalah ini. Pertama, karakteristik terjadinya kecurangan sehingga menyulitkan proses pendeteksian. Kedua, standar pengauditan belum cukup memadai untuk menunjang pendeteksian yang sepantasnya. Ketiga, lingkungan kerja audit dapat mengurangi kualitas audit dan keempat metode dan prosedur audit yang ada tidak cukup efektif untuk melakukan pendeteksian kecurangan. Berdasarkan permasalahan ini, perbaikan yang perlu disarankan untuk diterapkan. Kata kunci: auditing, fraud, financial statement fraud

  13. 5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.

    Science.gov (United States)

    2010-01-01

    ... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...

  14. Multiple Additive Regression Trees a Methodology for Predictive Data Mining for Fraud Detection

    National Research Council Canada - National Science Library

    da

    2002-01-01

    ...) is using new and innovative techniques for fraud detection. Their primary techniques for fraud detection are the data mining tools of classification trees and neural networks as well as methods for pooling the results of multiple model fits...

  15. 48 CFR 3032.006 - Reduction or suspension of contract payments upon finding of fraud.

    Science.gov (United States)

    2010-10-01

    ... contract payments upon finding of fraud. 3032.006 Section 3032.006 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL CONTRACTING... finding of fraud. ...

  16. Challenge of mitigating bank frauds by judicious mix of technology: Experience of a developing country

    Directory of Open Access Journals (Sweden)

    Madan Lal Bhasin

    2016-12-01

    Full Text Available Banks are the engines that drive the operations in the financial sector, money markets and growth of an economy. With the rapidly growing banking industry in India, frauds in banks are also increasing fast, and fraudsters have started using innovative methods. A questionnaire-based survey was conducted in 2013-14 among 345 bank employees to know their perception towards bank frauds, degree of their compliance level, and integration of technology to detect, control and prevent frauds. This study provides discussion of the attitudes, strategies, and the technology that bank specialists will need to combat frauds. Banks that can leverage advances in technology and analytics to improve fraud prevention will reduce their fraud losses. In 2015, the RBI introduced new mechanisms for banks to check loan frauds by taking pro-active steps by setting up a Central Fraud Registry, introduced the concept of Red Flagged Account, and Indian investigative agencies will soon start sharing their databases with banks.

  17. Fraud diamond: Detection analysis on the fraudulent financial reporting

    Directory of Open Access Journals (Sweden)

    Stefani Lily Indarto

    2016-11-01

    Full Text Available The accounting scandal became one of the reasons for analyzing financial statements in order to minimize fraud against the financial reporting. Therefore, companies use the services of a public accountant to audit the financial statements of companies that are expected to limit the fraudulent practices that increase the public’s confidence in the company’s financial statements. This study aims to detect fraud by using analysis of fraud diamond . This study takes banking companies listed on the Indonesian Stock Exchange in 2009-2014, with a total sample of 149 banks. Based on the results the external pressure, financial stability and capability have influence on fraudulent financial reporting. While target financial, ineffective monitoring and rationalization does not affect the fraudulent financial reporting

  18. CERN’s anti-fraud policy – the outcome of fraud investigations

    CERN Multimedia

    HR Department

    2014-01-01

    In the framework of CERN’s anti-fraud policy and in accordance with Operational Circular No. 10, entitled “Principles and procedures governing investigation of fraud”, published in January 2013, a number of fraudulent activities involving several members of the personnel, suppliers and contractors’ staff were investigated by the Internal Audit Service between April and August 2013.   In August 2013, the facts established by the Internal Audit Service were reported to the Director-General, who decided to pursue disciplinary action, for which the Joint Advisory Disciplinary Board (JADB) was consulted. The JADB heard all impugned members of the personnel, thoroughly examined each individual case, analysed the findings and made recommendations to the Director-General in March 2014. It found, in particular, conflicts of interest and fraudulent activities in violation of CERN's Procurement Rules. Sanctions were recommended by the JADB in all cases, rangi...

  19. Measures to Prevent Financial Fraud and Legalization of Illicit Funds

    Directory of Open Access Journals (Sweden)

    Chunitska Iryna I.

    2017-06-01

    Full Text Available The problems of preventing financial fraud and legalization of funds using mechanisms of the financial market are considered. The relevance of this problem in general and peculiar features of its research in developing economies are substantiated. The experience of organizations created to prevent the legalization of illicit funds is studied. It is determined that new organizations are created in response to the global challenges. It is justified that in Ukraine the fight against the legalization of illicit funds has actualized due to a lack of financial resources in the country, declaration of course towards European values and also as a result of the military conflict in the east of the country. The risk factors for financial fraud and illegal movement of financial flows are systematized according to the groups of conditions: pressure, favorable situation, propensity (justification. It is determined which levels of risk of generating illegal financial flows are inherent in different sectors of the economy depending on institutional factors. It is argued that the increase in the risks of illegal financial flows occurs under conditions of a low level of maturity of the institutional environment and a high level of information asymmetry. Types and tools of fraud in the financial market that increase the risks of illegal financial flows are systematized. It is determined that main types of fraud in the financial market are related to information manipulations and regulatory deficiencies. The world experience of legislative initiatives on counteracting the legalization of funds in financial markets is systematized. It is justified that, in order to prevent financial fraud and prevent legalization of illicit funds in Ukraine, it is necessary to ensure maximum transparency of information on the movement of financial flows in financial markets. In addition, regulators of the financial market should not only cooperate with each other but also prevent

  20. The Effectiveness of Fraud Prevention and Detection Methods at Universities in Indonesia

    OpenAIRE

    Zamzami, Faiz; Nusa, Nabella Duta; Timur, Rudi Prasetya

    2016-01-01

    Some cases of corruption have taken place in several universities in Indonesia. To prevent and handle the cases, internal auditors play pivotal roles in detecting and preventing fraud. Therefore, effective methods to detect and prevent fraud are needed. The methods are expected to set the appropriate measures to detect and prevent fraud effectively. This research proposed a question how the internal auditors perceive the effectiveness of fraud detection and prevention methods. The research ai...

  1. FAKTOR-FAKTOR YANG MEMPENGARUHI FRAUD PADA SATUAN KERJA PEMERINTAH DAERAH KABUPATEN TEMANGGUNG

    Directory of Open Access Journals (Sweden)

    Retno Wulandari

    2017-05-01

    Full Text Available Tujuan penelitian ini adalah untuk menggali persepsi pegawai di instansi pemerintahan mengenai faktor-faktor yang mempengaruhi fraud. Faktor-faktor tersebut antara lain sistem pengendalian internal, asimetri informasi, keadilan distributif, keadilan prosedural, kultur organisasi, penegakan hukum dan moralitas individu.Populasi dalam penelitian ini adalah Pegawai Negeri Sipil (PNS yang bekerja pada bagian keuangan di SKPD Kabupaten Temanggung sebanyak 95 responden. Metode pengumpulan data yang dilakukan dengan menggunakan metode kuesioner dengan skala likert 1-5. Penelitian ini menggunakan alat analisis data regresi berganda.Hasil penelitian menunjukkan bahwa terdapat pengaruh negatif sistem pengendalian internal terhadap fraud, terdapat pengaruh positif asimetri informasi terhadap fraud, tidak terdapat pengaruh keadilan distributif terhadap fraud, tidak terdapat pengaruh keadilan prosedural terhadap fraud, tidak terdapat pengaruh kultur organisasi terhadap fraud, tidak terdapat pengaruh penegakan hukum terhadap fraud, terdapat pengaruh negatif moralitas individu terhadap fraud. The purpose of this study was to explore the perceptions of employees in government agencies about the factors that influence fraud. These factors include the internal control system, the asymmetry of information, distributive justice, procedural justice, organizational culture, law enforcement and individual morality. The population in this study is were employees of SKPD in Temanggung Regencyas many as 95 respondents. Methods of data collection is done by using questionnaires with Likert scale 1-5. This study uses multiple regression data analysis tools. The results showed that there was a negative effect of the internal control system against fraud, there is a positive effect of information asymmetry against fraud, there is no influence of distributive justice against fraud, there is no influence procedural justice against fraud, there is no influence of organizational

  2. User profiling and classification for fraud detection in mobile communications networks

    OpenAIRE

    Hollmén, Jaakko

    2000-01-01

    The topic of this thesis is fraud detection in mobile communications networks by means of user profiling and classification techniques. The goal is to first identify relevant user groups based on call data and then to assign a user to a relevant group. Fraud may be defined as a dishonest or illegal use of services, with the intention to avoid service charges. Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. Whereas the int...

  3. The role of financial auditor in detecting and reporting fraud and error

    OpenAIRE

    Bunget, Ovidiu-Constantin

    2009-01-01

    Responsibility for preventing and detecting fraud rest with management entities. Although the auditor is not and cannot be held responsible for preventing fraud and errors, in your work, he can have a positive role in preventing fraud and errors by deterring their occurrence. The auditor should plan and perform the audit with an attitude of professional skepticism, recognizing that condition or events may be found that indicate that fraud or error may exist. Based on the audit risk asse...

  4. Optimization of Control Self Assessment Application to Minimize Fraud

    Directory of Open Access Journals (Sweden)

    Wendy Endrianto

    2016-05-01

    Full Text Available This article discussed a method that can be done by a company to minimize fraud action by applying Control Self Assessment (CSA. The study was conducted by studying literature on the topics discussed that were presented descriptively in a systematic manner through the review one by one from the initial problem to solve the problem. It can be concluded that CSA is one form of auditing practices that emphasizes anticipatory action (preventive of the act of detection (detective that the concept of modern internal audit which is carried more precise in application. It is one alternative that is most efficient and effective in reducing fraud.

  5. Fraud, corruption in the private sector and internal control quality

    Directory of Open Access Journals (Sweden)

    Luminiţa IONESCU

    2016-04-01

    Fraud and corruption are strongly connected in the private sector and the level of corruption in the last few years remains very high, despite the efforts of governments to reduce it. It is well known that local and multinational companies are paying bribes in order to win public contracts or benefits. The level of fraud became very high during the economic crunch, due to the globalization and expansion of computer systems. All the data is on-line on the computer systems and has became very vulnerable.  Thus, the governments are becoming more interested in securing the computer information and financial data.

  6. Deteksi Fraud Menggunakan Metode Model Markov Tersembunyi Pada Proses Bisnis

    Directory of Open Access Journals (Sweden)

    Andrean Hutama Koosasi

    2017-03-01

    Full Text Available Model Markov Tersembunyi merupakan sebuah metode statistik berdasarkan Model Markov sederhana yang memodelkan sistem serta membaginya dalam 2 (dua state, state tersembunyi dan state observasi. Dalam pengerjaan tugas akhir ini, penulis mengusulkan penggunaan metode Model Markov Tersembunyi untuk menemukan fraud didalam sebuah pelaksanaan proses bisnis. Dengan penggunaan metode Model Markov Tersembunyi ini, maka pengamatan terhadap elemen penyusun sebuah kasus/kejadian, yakni beberapa aktivitas, akan diperoleh sebuah nilai peluang, yang sekaligus memberikan prediksi terhadap kasus/kejadian tersebut, sebuah fraud atau tidak. Hasil ekpserimen ini menunjukkan bahwa metode yang diusulkan mampu memberikan prediksi akhir dengan evaluasi TPR sebesar 87,5% dan TNR sebesar 99,4%.

  7. 49 CFR 599.514 - Assessment of civil penalties.

    Science.gov (United States)

    2010-10-01

    ... ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Enforcement § 599.514 Assessment of civil penalties. (a) Not later... the amount of the civil penalty, the severity of the violation and the intent and history of the party...

  8. 32 CFR 516.67 - Overseas cases of fraud or corruption.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Overseas cases of fraud or corruption. 516.67... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas cases of fraud or corruption. (a) Commanders of overseas major commands will establish procedures...

  9. Fraud Prevention and Employee Rationalization in New York State Public Schools

    Science.gov (United States)

    Slezak, Kathleen

    2013-01-01

    Prompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that…

  10. 10 CFR 1015.103 - Antitrust, fraud, tax, interagency, transportation account audit, acquisition contract, and...

    Science.gov (United States)

    2010-01-01

    ... part on conduct in violation of the antitrust laws or to any debt involving fraud, the presentation of... whole or in part on conduct in violation of the antitrust laws or any claim involving fraud, the... 10 Energy 4 2010-01-01 2010-01-01 false Antitrust, fraud, tax, interagency, transportation account...

  11. 38 CFR 1.902 - Antitrust, fraud, and tax and interagency claims.

    Science.gov (United States)

    2010-07-01

    ... of the antitrust laws or to any debt involving fraud, the presentation of a false claim, or... whole or in part on conduct in violation of the antitrust laws or any claim involving fraud, the... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Antitrust, fraud, and tax...

  12. Dealing with poor data quality of OSINT data in fraud risk analysis

    NARCIS (Netherlands)

    van Keulen, Maurice

    2015-01-01

    Governmental organizations responsible for keeping certain types of fraud under control, often use data-driven methods for both immediate detection of fraud, or for fraud risk analysis aimed at more effectively targeting inspections. A blind spot in such methods, is that the source data often

  13. 75 FR 81556 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2010-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...

  14. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2012-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  15. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2013-12-27

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  16. 75 FR 68560 - Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based Swaps

    Science.gov (United States)

    2010-11-08

    ... 3235-AK77 Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based... fraud, manipulation, and deception in connection with the offer, purchase or sale of any security-based... measured and reasonable means to prevent fraud, manipulation, and deception in connection with security...

  17. The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules

    Science.gov (United States)

    2013-12-16

    payloads and instead began distributing Bitcoin miners and click fraud modules.3 From a technical perspective, the primary click fraud malware used in...this era operated in the indiscriminate “auto-clicking” fashion we describe in Section 5. Alongside the click fraud and Bitcoin payloads, ZeroAccess

  18. MODEL PENDETEKSIAN KECURANGAN LAPORAN KEUANGAN OLEH AUDITOR SPESIALIS INDUSTRI DENGAN ANALISIS FRAUD TRIANGLE

    Directory of Open Access Journals (Sweden)

    Reskino

    2016-08-01

    Full Text Available Abstrak: Model Pendeteksian Kecurangan Laporan Keuangan dengan Analisis Fraud Triangle. Penelitian ini bertujuan untuk membuat model dalam mendeteksi kecurangan laporan keuangan. Penelitian ini menguji variabel fraud triangle dan auditor spesialis industri dengan kecurangan laporan keuangan. Sampel penelitian adalah 30 perusahaan fraud dan 30 perusahaan non-fraudyang listing di Bursa Efek Indonesia (BEI serta terkena sanksi dan kasus oleh Otoritas Jasa Keuangan (OJK. Hasil penelitian ini menunjukkan financial targetsdapat mendeteksi kecurangan laporan keuangan, sedangkan financial stabililty tidak dapat mendeteksi kecurangan laporan keuangan. Abstract: Financial Statement Fraud Detection Model with Fraud Triangle Analysis. The research purposes is to create a model to detect financial statement fraud. This research examines the variable of fraud triangle and auditor industry specialization with financial statement fraud. Samples were 30 companies of fraud and 30 non-fraud companies that were listed on the Indonesia Stock Exchange (IDX and sanctioned by the Financial Services Authority (FSA. The result shows the financial targets can be detect financial statement fraud, while financial stability can’t be detect financial statement fraud.

  19. State Program Integrity Reviews

    Data.gov (United States)

    U.S. Department of Health & Human Services — State program integrity reviews play a critical role in how CMS provides effective support and assistance to states in their efforts to combat provider fraud and...

  20. Civil and common law influences on the Danish auditor's responsibilities in relation to fraud

    DEFF Research Database (Denmark)

    Holm, Claus

    2014-01-01

    in the form of ‘general principles legislature’, ensured that the role of the auditor was defined as a result of market forces and the judicial processes of the courts. We observe that in the Danish legal system important interpretative powers are granted to the courts in line with case law traditions...

  1. Civil Engineering: Improving the Quality of Life.

    Science.gov (United States)

    One Feather, Sandra

    2002-01-01

    American Indian civil engineers describe the educational paths that led them to their engineering careers, applications of civil engineering in reservation communities, necessary job skills, opportunities afforded by internship programs, continuing education, and the importance of early preparation in math and science. Addresses of 12 resource Web…

  2. 76 FR 14637 - State Medicaid Fraud Control Units; Data Mining

    Science.gov (United States)

    2011-03-17

    ...] State Medicaid Fraud Control Units; Data Mining AGENCY: Office of Inspector General (OIG), HHS. ACTION... and analyzing State Medicaid claims data, known as data mining. To support and modernize MFCU efforts... (FFP) in the costs of defined data mining activities under specified conditions. In addition, we...

  3. Value-added tax fraud in the European Union

    NARCIS (Netherlands)

    Aronowitz, A.A.; Laagland, D.C.G.; Paulides, G.

    1996-01-01

    Questions addressed in this project included:What are the existing control mechanisms and how do they operate? What public bodies are responsible for the fight against Value Added Tax (VAT) fraud and what are their competencies? What are the possibilities to exchange information between member

  4. Exploring fraud and abuse in National Health Insurance Scheme ...

    African Journals Online (AJOL)

    This study explored patterns of fraud and abuse that exist in the National Health Insurance Scheme (NHIS) claims in the Awutu-Effutu-Senya District using data mining techniques, with a specific focus on malaria-related claims. The study employed quantitative research approach with survey design as a strategy of enquiry.

  5. 78 FR 29055 - State Medicaid Fraud Control Units; Data Mining

    Science.gov (United States)

    2013-05-17

    ... pursue Medicaid provider fraud, we finalize proposals to permit Federal financial participation (FFP) in... general approach to data mining by MFCUs is to give each MFCU the autonomy to choose how to operate its...) to read as follows: Sec. 1007.19 Federal financial participation (FFP). * * * * * (e) * * * (2...

  6. Online credit card fraud prediction based on hierarchical temporal ...

    African Journals Online (AJOL)

    This understanding gave birth to the Hierarchical Temporal Memory (HTM) which holds a lot of promises in the area of time-series prediction and anomaly detection problems. This paper demonstrates the behaviour of an HTM model with respect to its learning and prediction of online credit card fraud. The model was ...

  7. Reduce Fraud Risk in Your District with Stronger Internal Controls

    Science.gov (United States)

    Okrzesik, Daryl J.; Nuehring, Bert G.

    2011-01-01

    Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…

  8. perception of communication network fraud dynamics by network ...

    African Journals Online (AJOL)

    ES Obe

    work fraud dynamics by network administrators and stakeholders. In considering ... cyber crime within the last two years. How- ever, two-thirds of the ... ˆ increased exposure to unpredictable fi- nancial losses ... The intentions of the customers are reflected ..... 'There is a 95% confidence that the differ- ence between the ...

  9. Getting Something for Nothing: Trump, Fraud, and the Tea Party

    Science.gov (United States)

    Bordelon, David

    2017-01-01

    David Bordelon identifies himself as one of the majority of Americans who voted to keep Trump out of office. In this article he discusses his confusion by the Tea Party's fixation on welfare fraud, and inability to recognize it in President Trump's behavior. The author says that he can only hope that his confusion will be shared, and progress to…

  10. Perception of Communication Network Fraud Dynamics by Network ...

    African Journals Online (AJOL)

    In considering the implications of the varied nature of the potential targets, the paper identifies the view to develop effective intelligence analysis methodologies for network fraud detection and prevention by network administrators and stakeholders. The paper further notes that organizations are fighting an increasingly ...

  11. Suing One's Sense Faculties for Fraud: 'Justifiable Reliance' in the ...

    African Journals Online (AJOL)

    The law requires that plaintiffs in fraud cases be 'justified' in relying on a misrepresentation. I deploy the accumulated intuitions of the law to defend externalist accounts of epistemic justification and knowledge against Laurence BonJour's counterexamples involving clairvoyance. I suggest that the law can offer a ...

  12. Fraud by using a check | Azarian | Journal of Fundamental and ...

    African Journals Online (AJOL)

    If someone used check as a tool to fraud and looting of property of others, should they just be subject to check law, and according to the provisions of the law are prosecuted? Are crook people the same as honorable merchants that due to some unwanted changes and fluctuations in the market and social conditions

  13. SOME CONSIDERATIONS REGARDING THE MANIFESTATION OF FISCAL FRAUD IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Dumitrescu Serju

    2013-07-01

    Full Text Available In our paper we shall try to present two mechanisms of fiscal fraud used by economical agents and also found in the control actions performed by the fiscal organs at different commercial societies from Romania. The presented mechanisms refer to the fiscal fraud resulted from fictitious acquisitions of goods and services done by Romanian firms which have as beneficiaries other commercial societies which are fiscally registered in Romania. Being empirically examined, the fiscal fraud will be presented through the use of some figures which will describe the detailed operations step by step.For the cases we have chosen to present we will describe the real circuit of goods and money according to the documents. We will also refer to the possibility of identifying the risk of fiscal fraud that results from the reports provided by the economic agents for different state institutions. We will also consider the information provide by the books of prime entry and bookkeeping, documents which have to be written by the commercial societies according to the Law accountancy nr. 82/199, with further modifications and completions. The mechanisms of fiscal fraud in use can be identical with the ones presented in this paper or they can be different as „new elements” can appear; these „new elements” depend on the type of activity performed, the modifications the legislative framework, the performers’ creativity or other external or internal factors which are not identified by the fiscal organs. By identifying the fiscal fraud mechanisms and the way in which they function, the fiscal organs will be given the opportunity to take the necessary measures so that the fiscal resources of the state consolidated budget should not be affected by such operations. It is will known that we can speak of fiscal fraud and shadow economy in any country but ,according to the reports and statistics published by different international institutions, Romania’s shadow

  14. Job Prospects for Civil Engineers.

    Science.gov (United States)

    Basta, Nicholas

    1985-01-01

    Government programs and renewed industrial activity have combined with stable enrollments to create bright job prospects for civil engineers. Areas with good opportunities include highway reconstruction and rehabilitation, water-resource management, and new factory construction. The subspecialty of structural engineering has a growing need in…

  15. Stasis and Bellum Civile

    DEFF Research Database (Denmark)

    Lange, Carsten Hjort

    2017-01-01

    David Armitage’s new monograph Civil Wars: A History in Ideas (2017) will undoubtedly long remain a standard reference work. It presents readers with a vision of civil war as part of the longue durée. The argument might be further strengthened, however, if a more inclusive Greco-Roman approach...... to ancient civil war is accepted. This essay focuses on stasis vs. bellum civile, the origins of the concept of civil war, the approach of later Roman writers (such as Appian and Cassius Dio) to the concepts of stasis and bellum civile, and, finally, the question of what makes a civil war a civil war....... Whatever concepts were used, the Romans were not the first to experience internal war as a civil war—that is, a war between the citizens of a polity....

  16. Department of Physics' Involvement of the Impact Testing Project of the High Speed Civil Transport Program (HSCT)

    Science.gov (United States)

    VonMeerwall, Ernst D.

    1994-01-01

    The project involved the impact testing of a kevlar-like woven polymer material, PBO. The purpose was to determine whether this material showed any promise as a lightweight replacement material for jet engine fan containment. The currently used metal fan containment designs carry a high drag penalty due to their weight. Projectiles were fired at samples of PBO by means of a 0.5 inch diameter Helium powered gun. The Initial plan was to encase the samples inside a purpose-built steel "hot box" for heating and ricochet containment. The research associate's responsibility was to develop the data acquisition programs and techniques necessary to determine accurately the impacting projectile's velocity. Beyond this, the Research Associate's duties include any physical computations, experimental design, and data analysis necessary.

  17. Global Standards of Market Civilization

    DEFF Research Database (Denmark)

    Global Standards of Market Civilization brings together leading scholars, representing a range of political views, to investigate how global 'standards of market civilization' have emerged, their justification, and their political, economic and social impact. Key chapters show how as the modern...... thought, as well as its historical application part II presents original case studies that demonstrate the emergence of such standards and explore the diffusion of liberal capitalist ideas through the global political economy and the consequences for development and governance; the International Monetary...... Fund's capacity to formulate a global standard of civilization in its reform programs; and problems in the development of the global trade, including the issue of intellectual property rights. This book will be of strong interest to students and scholars in wide range of fields relating to the study...

  18. 42 CFR 438.704 - Amounts of civil money penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Amounts of civil money penalties. 438.704 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE Sanctions § 438.704 Amounts of civil money penalties. (a) General rule. The limit on, or the maximum civil money penalty the State may impose varies...

  19. Civil Law Glossary.

    Science.gov (United States)

    Update on Law-Related Education, 1997

    1997-01-01

    Presents a glossary of civil law terms originally compiled for journalists by the American Bar Association. Defines many essential civil law concepts and practices including compensatory damages, jurisdiction, motion to dismiss, discovery, and remedy. (MJP)

  20. Citizenship in civil society?

    NARCIS (Netherlands)

    Ossewaarde, Marinus R.R.

    2007-01-01

    This article seeks to provide a conceptual framework to complement and guide the empirical analysis of civil society. The core argument is that civil society must be understood, not as a category of (post)industrialized society, but as one of individualized society. Civil society is characterized by

  1. The detection and settlement of VAT fraud in four countries : Addendum to the report value-added tax fraud in the European Union

    NARCIS (Netherlands)

    Aronowitz, A.A.; Laagland, D.C.G.; Paulides, G.

    1996-01-01

    This addendum to the report 'Value-added tax fraud in the European Union' gives additional information on the detection and settlement of VAT fraud in Belgium, Germany, the United Kingdom and the Netherlands. See link to the report at: More information.

  2. 75 FR 24450 - Early Retiree Reinsurance Program

    Science.gov (United States)

    2010-05-05

    ... ensure implementation of a diabetes management program that includes aggressive monitoring and behavioral... issuer or group health plan's, as applicable) policies and procedures to detect fraud, waste and abuse... requires the Secretary to establish procedures to protect against fraud, waste and abuse. In order to...

  3. Fraude e branqueamento de capitais no mercado da droga

    OpenAIRE

    Amaro, Andreia Ramos

    2017-01-01

    Versão final (Esta versão contém as críticas e sugestões dos elementos do júri) Ao longo das últimas décadas e com a crescente globalização, os infratores têm adotado novos e sofisticados métodos de ocultação de capitais ilícitos, nomeadamente, provenientes da droga. Perante isto, o presente trabalho foca-se na temática do branqueamento de capitais e da fraude no mercado da droga, sendo o seu grande objetivo o estudo da relação entre branqueamento de capitais, fraude e o mercado da drog...

  4. Credit card fraud detection using neural network and geolocation

    Science.gov (United States)

    Gulati, Aman; Dubey, Prakash; MdFuzail, C.; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.

  5. PEMERIKSAAN FRAUD DALAM AKUNTANSI FORENSIK DAN AUDIT INVESTIGATIF

    Directory of Open Access Journals (Sweden)

    Annisa Sayyid

    2015-08-01

    Full Text Available The History of world bussiness is full of ethics violation cases and financial scandals. Public can even see clearly the various economic crimes such as corruption, financial engineering and money laundering. These issues are always interesting since it involves tricks in information presentation which indicates a fraud. The application of forensic accounting and investigative audits is a solution to the anxiety of financial world. Forensic accounting and investigative audits in its simplest form is a blend between the disciplines of accounting, auditing and law. Forensic accounting is the use of accounting skills combined with the ability to solve a problem or alleged fraud. The investigative audit is an attempt to prove a mistake in accordance with the provisions of applicable law.

  6. Presence of Corporate Frauds at a Global Level

    Directory of Open Access Journals (Sweden)

    Vranješ Svjetlana

    2017-06-01

    Full Text Available The legislative bodies of the countries, members of the accounting and auditing profession, various associations have taken a number of preventive measures and mechanisms for combating corporate criminal activities and financial frauds, but unfortunately, the fact is that even today they often happen in both undeveloped and the most developed market economies. It is therefore essential to pay significant attention to corporate criminal activity and financial frauds that are happening in the business world. The aim of this paper is to show the presence of different forms of corporate criminal activity at a global level, and to display a conceptual framework of criminal activity and motives for their doing. Concluding remarks of this paper provide guidelines for further research and recommendations on how to improve the mechanisms for preventing and detecting criminal activity.

  7. Deterring Online Advertising Fraud through Optimal Payment in Arrears

    Science.gov (United States)

    Edelman, Benjamin

    Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountability. But partners are not paid until after their work is complete, and advertisers can extend this delay both to improve detection of improper partner practices and to punish partners who turn out to be rule-breakers. I capture these relationships in a screening model with delayed payments and probabilistic delayed observation of agents’ types. I derive conditions in which an advertising principal can set its payment delay to deter rogue agents and to attract solely or primarily good-type agents. Through the savings from excluding rogue agents, the principal can increase its profits while offering increased payments to good-type agents. I estimate that a leading affiliate network could have invoked an optimal payment delay to eliminate 71% of fraud without decreasing profit.

  8. Tax FRAUD DETECTION ACTORS evasion between fiscal and penalty

    Directory of Open Access Journals (Sweden)

    Ionuț Spătărelu

    2017-12-01

    Full Text Available Fraud occurs both in the public and private sectors and is practiced most often in collusion with those around us, with colleagues, customers and suppliers targeting both material goods and goods from other categories. The consequences of fraud are enormous for the company and may threaten its existence and there is the possibility of putting its reputation at risk. Generally speaking, financial control acts and operations consist of documentary and factual verifications, written records of findings, appraisals and conclusions, as well as decisions on actions and possible coercions necessary to restore the compliance of controlled subjects’ financial activity with the law. Internal Auditing is a support function because it enables business managers and organizations to better manage their activities.

  9. BUDAYA CARI UNTUNG SEBAGAI PEMICU TERJADINYA FRAUD: SEBUAH STUDI ETNOGRAFI

    Directory of Open Access Journals (Sweden)

    Dewi Syahrina

    2017-04-01

    Full Text Available Penelitian ini bertujuan untuk mengetahui budaya yang memicu terjadinya fraud pada realisasi keuangan negara. Penelitian dilakukan pada instansi pemerintah daerah di Provinsi ABC. Metode etnografi ala Spradley dipilih untuk menemukan budaya pemicu tersebut. Hasil penelitian menunjukkan bahwa budaya yang memicu terjadinya fraud adalah budaya cari untung, yang terlihat dari kebiasaan “memanfaatkan” kebutuhan instansi, kebiasaan menyalahgunakan kewenangan yang dimiliki, dan kebiasaan menyiasati beberapa ketentuan keuangan negara pada PMK 113/PMK.05/2012 dan PMK 65/PMK.02/2015 untuk kepentingan pribadi maupun kelompok. Hasil penelitian ini memberikan informasi berupa bentuk-bentuk penyiasatan yang dilakukan, sehingga dapat dijadikan dasar sebagai bahan pertimbangan untuk perubahan atau perbaikan kebijakan dan peraturan yang disiasati tersebut

  10. Transformation of fraud activities in procurement system in Indonesia

    Science.gov (United States)

    Setiani, N.; Huda, S. N.; Pulungan, R.; Winarko, E.

    2017-03-01

    E-procurement has been applied in Indonesia since 2008 through the adoption of Electronic Procurement System (SPSE). The purpose of the use of SPSE in the procurement process is to improve the efficiency of goods or services procurement. In the bidding process, intensive communication and data exchange between providers and organizers are urgently needed. Through SPSE, the frequency of face to face meetings between providers and the committee can be reduced. This is expected to minimize potential fraud behaviors in the goods or services procurement conducted through the tender process. There exists a transformation of activities in the procurement through SPSE from the tender process that was previously done manually. In this paper, we analyze this transformation between manual procurement process and SPSE-based procurement process. The result of the analysis is exploited for investigating the possibility of fraud behavior transformations in every phase of e-procurement activities.

  11. Contracting Processes, Internal Controls, and Procurement Fraud: A Knowledge Assessment

    Science.gov (United States)

    2015-04-30

    entails the tone at the top. Management’s integrity and ethical behavior sets the tone for the organization (COSO, 2013). A weak control environment can...the collusion category of fraud schemes are kickbacks, bribery , and deliberate split purchases. Kickbacks involve government officials receiving...something of value such as money from a contractor for personal gain in exchange for providing a favor such as submitting false invoices. Bribery

  12. Boardroom strategies for managing risks and preventing frauds

    OpenAIRE

    Coulson-Thomas, Colin

    2017-01-01

    Directors are expected to be entrepreneurial while at the same time exercising prudent control. Enterprise and control are two sides of the directorial coin. Considers whether risk management professionals should do more in support of creativity, innovation, enterprise and entrepreneurship before turning to some cyber security and fraud control issues and dilemmas relating to data security breaches, the internet of things, protecting customer communications, and data sharing with collaborator...

  13. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection

    OpenAIRE

    Hooi, Bryan; Shah, Neil; Beutel, Alex; Gunnemann, Stephan; Akoglu, Leman; Kumar, Mohit; Makhija, Disha; Faloutsos, Christos

    2015-01-01

    Review fraud is a pervasive problem in online commerce, in which fraudulent sellers write or purchase fake reviews to manipulate perception of their products and services. Fake reviews are often detected based on several signs, including 1) they occur in short bursts of time; 2) fraudulent user accounts have skewed rating distributions. However, these may both be true in any given dataset. Hence, in this paper, we propose an approach for detecting fraudulent reviews which combines these 2 app...

  14. DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    FRANCISCA NONYELUM OGWUELEKA

    2011-06-01

    Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.

  15. More than meets the eye: digital fraud in dentistry.

    Science.gov (United States)

    Rao, S A; Singh, N; Kumar, R; Thomas, A M

    2010-01-01

    Digital photographs play a substantial role in the presentation and validation of clinical cases for documentation and research purposes in esthetically oriented professions such as dentistry. The introduction of sophisticated cameras and "easy to use" computer software readily available on today's market has enabled digital fraud to emerge as a common and widely used practice. Hence, it is essential that both dentists and editorial circles are aware and cautious with regard to the possibility of digital fraud. A set of 10 routine "pre-" and "post" treatment dental procedure photographs were taken and randomly manipulated using standard desktop software. A team of 10 dental professionals were selected and each one of them was individually requested to review and evaluate the authenticity of the photographs. An assessment of expert opinion revealed an overall sensitivity of 60% and a sensitivity of 15% in correctly identifying a manipulated photograph, which is considered low. Furthermore, there was poor interobserver agreement. Advanced technology that is easily available has resulted in adept digital fraud that is difficult to detect. There is a need for awareness among both dental practitioners and the editorial circle regarding misrepresentation due to image manipulation. It is therefore necessary to follow a skeptical approach in the assessment of digitalized photos used in research and as a part of clinical dentistry.

  16. Reinforcement Tool of Whistleblowing to Eradicate Fraud in Public Sector

    Directory of Open Access Journals (Sweden)

    Basri Siti Aisyah

    2017-01-01

    Full Text Available Whistleblowing is an internal control system that be a way to reduce or eradicate fraud. This paper focuses on investigating the reasons for whistleblowing is not a preferred method to eradicate fraud. This paper starts with defining the term “whistleblowing”. In its simplest form, whistleblowing involves the act of reporting improper conduct within an organisation to internal or external parties. This paper explains the issues and effects concerning whistleblowing. One of the issues is the violation of public trust. Lastly, this paper will describe the reasons for resistance of people to blow the whistle. Among the reasons is the fear of reprisal. This is a concept paper and it aims to conduct interview session with the Head for every local authority in Melaka. The findings of this paper can be used by the Government to create a new model related to whistleblowing to eradicate fraud in public sector. The Government could use this paper as the support to enhance the achievement of National Key Result Areas (NKRAs Against Corruption.

  17. Factors affecting the government procurement fraud: The independent auditor’s point of view. Evidence from Indonesia

    Directory of Open Access Journals (Sweden)

    Zulaikha

    2016-11-01

    Full Text Available The objective of this study was examining the factors affecting the government procurement fraud. Based on the fraud triangle and the theory of planned behavior, this study proposed seven hypothesis, those are tested by regression analysis. This study used primary data gathered by surveys to members of The Boards of the Republic Indonesia- Financial Auditors, who act as external auditors for the Government. They were asked to assess factors influencing the government procurement of goods and services fraud. There were 297 auditors of the Boards that participated in this survey. The result showed that the procurement frauds were influenced by the lack of procurement committee quality, the weakness of procurement control, and the intentions to engage fraud. The intentions to engage fraud were significantly influenced by the attitude toward fraud, subjective norms, and the perceived behavioral control. Furthermore, other elements of fraud triangle, the financial pressure, did not influence to the procurement fraud.

  18. Summer Research Program (1992). Summer Faculty Research Program (SFRP) Reports. Volume 6. Arnold Engineering Development Center, Civil Engineering Laboratory, Frank J. Seiler Research Laboratory, Wilford Hall Medical Center

    Science.gov (United States)

    1992-12-01

    sediment fauna, rhizome and stem biota (amphipods, bivalves and polychaetes), leaf periphyton ( microbiota , anemones, hydroids, ectoprocts, crustaceans...programs, the Air Force should support a small scale experiment which must be unique to the Air Force applications. If results in phase I are fruitful ,Ŕ...dissolved in the melt. This method for preparing a Li-containing neutral melt does not appear to be fruitful . RESULTS AND DISCUSSION After MEIC of acceptable

  19. Science as a Matter of Honour: How Accused Scientists Deal with Scientific Fraud in Japan.

    Science.gov (United States)

    Pellegrini, Pablo A

    2017-06-26

    Practices related to research misconduct seem to have been multiplied in recent years. Many cases of scientific fraud have been exposed publicly, and journals and academic institutions have deployed different measures worldwide in this regard. However, the influence of specific social and cultural environments on scientific fraud may vary from society to society. This article analyzes how scientists in Japan deal with accusations of scientific fraud. For such a purpose, a series of scientific fraud cases that took place in Japan has been reconstructed through diverse sources. Thus, by analyzing those cases, the social basis of scientific fraud and the most relevant aspects of Japanese cultural values and traditions, as well as the concept of honour which is deeply involved in the way Japanese scientists react when they are accused of and publicly exposed in scientific fraud situations is examined.

  20. Fraud adversely affecting the budget of the Europen Union: the forms, methods and causes

    Directory of Open Access Journals (Sweden)

    Zlata Đurđević

    2006-09-01

    Full Text Available The paper analyses the forms, methods and causes of fraud that are perpetrated to the detriment of the budget of the European Union. The forms in which EU fraud appears are shown according to the criterion of kind of budgetary resource. Crime affecting the budgetary revenue of the EU tends to appear in the form of customs duty-evasion and false declarations concerning the customs-relevant information about goods. Crime adversely affecting the expenditure side of the EU budget appears in the form of subsidy fraud in the area of the Common Agricultural Policy, and subsidy fraud in the area of the structural policies. The methods used for the EU fraud committed and considered in the paper are document forgery, concealment of goods, corruption, violence and fictional business and evasion of the laws. In conclusion an explanation is given of the main exogenous criminogenic factors that lead to the EU frauds commonly perpetrated.

  1. ERRORS AND FRAUD IN ACCOUNTING. THE ROLE OF EXTERNAL AUDIT IN FIGHTING CORRUPTION

    Directory of Open Access Journals (Sweden)

    Luminita Ionescu

    2017-12-01

    Full Text Available Accounting errors and fraud are common in most businesses, but there is a difference between fraud and misinterpretation of communication or accounting regulations. The role of management in preventing fraud becomes important in the last decades and the importance of auditing in curbing corruption is increasingly revealed. There is a strong connection between fraud and corruption, accelerated by electronic systems and modern platforms. The most recent developments tend to confirm that external auditing is curbing corruption, due to international accounting and auditing standards at national and regional levels. Thus, a better implementation of accounting standards and high quality of external control could prevent errors and fraud in accounting, and reduce corruption, as well. The aim of this paper is to present some particular aspects of errors and fraud in accounting, and how external audit could ensure accuracy and accountability in financial reporting.

  2. Medicare and Medicaid fraud and abuse regulations.

    Science.gov (United States)

    Liang, F Z; Black, B L

    1991-11-01

    Specific business arrangements that are protected under legislation and regulations governing parties doing business with Medicare or Medicaid are discussed. Regulations implementing the Medicare and Medicaid Patient Protection Act of 1987 specify practices and activities that are not subject to criminal penalties under the antikickback provisions of the Social Security Act or to exclusion from Medicare or state health-care programs. As of July 29, 1991, all organized health-care settings that receive payments from either Medicare or state health-care programs must comply with these regulations. The final rule sets forth "safe harbors"--exceptions to prohibitions against (1) kickbacks, bribes, rebates, and other illegal activities involving remunerations for patient referrals and (2) inducements to purchase or lease goods paid for by Medicare or state health-care programs. The safe harbors comprise 11 broad categories--investment interests, space rental, equipment rental, personal services and management contracts, purchase of a medical practice, referral services, warranties, discounts, employees, group purchasing organizations, and waiver of deductibles and coinsurance. Implications for pharmacy are discussed. These regulations will affect the purchase of pharmaceuticals by institutional pharmacies. Each institution should review its current practices to determine whether they are within the safe harbors.

  3. Online frauds:learning from victims why they fall for these scams

    OpenAIRE

    Button, Mark; McNaughton Nicholls, Carol; Kerr, Jane; Owen, Rachael

    2014-01-01

    Online frauds have become a major problem in many countries with millions of victims from a wide diversity of scams committed in full or part online. This paper explores the extent and nature of this problem. Using data from depth interviews with 15 online fraud victims, 6 focus groups with a further 48 online fraud victims and interviews with 9 professional stakeholders involved in combating this problem. The paper explores why victims fall for online scams. It identifies a range of reasons ...

  4. NASA-UVA Light Aerospace Alloy and Structures Technology Program (LA2ST). Supplement: Research on Materials for the High Speed Civil Transport

    Science.gov (United States)

    Gangloff, Richard P.; Starke, Edgar A., Jr.

    1997-01-01

    This report documents the progress achieved over the past 6 to 12 months on four graduate student projects conducted within the NASA-UVA Light Aerospace Alloy and Structures Technology Program. These studies were aimed specifically at light metallic alloy issues relevant to the High Speed Civil Transport. Research on Hydrogen-Enhanced Fracture of High-Strength Titanium Alloy Sheet refined successfully the high resolution R-curve method necessary to characterize initiation and growth fracture toughnesses. For solution treated and aged Low Cost Beta without hydrogen precharging, fracture is by ductile transgranular processes at 25 C, but standardized initiation toughnesses are somewhat low and crack extension is resolved at still lower K-levels. This fracture resistance is degraded substantially, by between 700 and 1000 wppm of dissolved hydrogen, and a fracture mode change is affected. The surface oxide on P-titanium alloys hinders hydrogen uptake and complicates the electrochemical introduction of low hydrogen concentrations that are critical to applications of these alloys. Ti-15-3 sheet was obtained for study during the next reporting period. Research on Mechanisms of deformation and Fracture in High-Strength Titanium Alloys is examining the microstructure and fatigue resistance of very thin sheet. Aging experiments on 0. 14 mm thick (0.0055 inch) foil show microstructural agility that may be used to enhance fatigue performance. Fatigue testing of Ti-15-3 sheet has begun. The effects of various thermo-mechanical processing regimens on mechanical properties will be examined and deformation modes identified. Research on the Effect of Texture and Precipitates on Mechanical Property Anisotropy of Al-Cu-Mg-X and Al-Cu alloys demonstrated that models predict a minor influence of stress-induced alignment of Phi, caused by the application of a tensile stress during aging, on the yield stress anisotropy of both modified AA2519 and a model Al-Cu binary alloy. This project

  5. PENGARUH FAKTOR-FAKTOR FRAUD DIAMOND DAN GONE THEORY TERHADAP KECURANGAN AKADEMIK

    Directory of Open Access Journals (Sweden)

    Anisatul Munirah

    2018-03-01

    Full Text Available This research aims to determine whether there is a simultaneous and partial influence between the pressure, opportunity, rationalization, capability, greed, need and exposure of academic fraud on students competency accounting expertise SMK Negeri 1 Kendal. Population in this research are students of accounting expertise skill SMK Negeri 1 Kendal a number of 319 students. Sampling technique in this research is saturated sample. Data collection methods using questionnaires and documentation. The method of analysis used is descriptive analysis and multiple linear regression analysis. The results showed that there was a positive and significant influence simultaneously to academik farud of 59.4%, there is a positive and significant influence pressure on academic fraud by 2.4%, there is a positive and significant influence opportunity on academic fraud by 1.46%, there is a positif and significant influence rationalization on academik fraud by 1.54%, there is a positie and significant influence capability on academic fraud by 4.28%, there is a positive and significant influence greed on academic fraud by 2.96%, there is a positive and significant influence need on academic fraud by 1.59%, and there is a negative and siignificant exposure on academic fraud by -11,8%. The conclusion in this research is that pressure, opportunity, rationalization, capability, greed, need and exposure have positive and significant influence to academik fraud. Suggestions for futher researchers are expected to use analytical tools other than SPSS.

  6. AICPA standard aids in detecting risk factors for fraud. American Institute of Certified Public Accountants.

    Science.gov (United States)

    Reinstein, A; Dery, R J

    1999-10-01

    The American Institute of Certified Public Accountants' Statement on Auditing Standards (SAS) No. 82, Consideration of Fraud in a Financial Statement Audit, requires independent auditors to obtain reasonable assurance that financial statements are free of material mis-statements caused by error or fraud. SAS No. 82 provides guidance for independent auditors to use to help detect and document risk factors related to potential fraud. But while SAS No. 82 suggests how auditors should assess the potential for fraud, it does not expand their detection responsibility. Accordingly, financial managers should discuss thoroughly with auditors the scope and focus of an audit as a means to further their compliance efforts.

  7. Civil Society and Governance

    DEFF Research Database (Denmark)

    Hulgård, Lars

    An illustration of how important the relationship is between civil society anbd governance. A short historic journey with four snapshots of times and situations that have provided interesting evidence about the connection between civil society and governance. My goal for the short historic journey...... is to make clear and hopefully even verify that providing knowledge about the impact of civil society and citizens’ participation on governance is one of the most urgent research tasks in the current period of time....

  8. Legalisation of Civil Wars

    DEFF Research Database (Denmark)

    Buhl, Kenneth Øhlenschlæger

    2009-01-01

    This article is concerned with the legal challenges of regulating civil wars in international humanitarian law. Civil war is not a term used in international law; it falls however, withing the context of the legal term 'armed conflicts not of an international character', although the shorter 'non......-international armed conflict' is used here. Civil wars are usually limited to the territory of a state. Considering that international law is generally concerned with the legal relations between states – being a legal system based on the system of states with states as its subjects – the main question is how civil...... wars as internal conflicts have become subject to international humanitarian law....

  9. Risk Oriented Audit Methodology’s Improvement, based on the Fraud Theory

    Directory of Open Access Journals (Sweden)

    Sergei V. Arzhenovskii

    2016-12-01

    Full Text Available Modern economic development is accompanied by the increasing complexity of the relationship structure, intercompany transactions, the requirements for information disclosure on the entity’s activities. It leads to the opportunities growth of fraudulent representation public companies reporting. The external audit is considered as an institution that resists to negative processes. The issues of improving the tools that assessing the risk of material misstatement of the financial statements due to fraud from the standpoint the fraud theory have been examined here. Determining potential areas in which methodology for risk assessment of material misstatement of the financial statements due to fraud in an audit are based on the modern fraud theory interpretations will be develop. Functional and structural, comparative, logical and historical, deductive and inductive analyst methods have been used. Retrospective analysis on research areas in the fraud theory field has been performed. Perspective directions for improving methodology and methods for risk assessment of material misstatement of the financial statements in an audit have been identified. Methodology development for fraud risk assessment procedures in an audit of financial statements is based on “fraud diamond” theory. Creating new interpretations the fraud theory during last fifteen years is a consequence the expansion opportunities for corporate fraud, one of the most common species which is the financial statements falsification. Changing the list of factors that could initiate the fraud in the company's public reporting requires that the methods of its identification during the audit should be improved. Methodology and methods risk assessment of intentional material misstatement of the financial statements need to be improved in the direction both the modern modification of fraud theory.

  10. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  11. Combating healthcare corruption and fraud with improved global health governance

    Science.gov (United States)

    2012-01-01

    Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of “global health corruption” and development of a treaty protocol to combat this crucial issue. PMID:23088820

  12. Combating healthcare corruption and fraud with improved global health governance.

    Science.gov (United States)

    Mackey, Tim K; Liang, Bryan A

    2012-10-22

    Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of "global health corruption" and development of a treaty protocol to combat this crucial issue.

  13. Fraud Risk in Audit Activities According to IAS 8

    Directory of Open Access Journals (Sweden)

    Raluca – Ionela Radu

    2014-03-01

    Full Text Available According to international auditing standards, fraud is an intentionally action realised by one or more persons as management, employees or third parties, action that generate erroneous interpretation of financial statements. The real intention is to cheat. However, there can be involved some erroneous calculus generated by creative accounting. The concept of “error” refers to unintentionally mistakes that could appear in financial statements. We think there could be mathematical or accounting mistakes, unintentionally omission, or wrong interpretation of certain facts, accounting policies wrong application. All these actions are unwittingly. It is very important to identify situations cause and take necessary measures to eliminate them

  14. Paying for Likes? Understanding Facebook like fraud using honeypots

    OpenAIRE

    De Cristofaro, E.; Friedman, A.; Jourjon, G.; Kaafar, M. A.; Shafiq, M. Z.

    2014-01-01

    Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of profiles that also like other pages to elude fraud protection algorithms, however, to the best of ou...

  15. Paying for Likes? Understanding Facebook Like Fraud Using Honeypots

    OpenAIRE

    De Cristofaro, Emiliano; Friedman, Arik; Jourjon, Guillaume; Kaafar, Mohamed Ali; Shafiq, M. Zubair

    2014-01-01

    Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of profiles that also like other pages to elude fraud protection algorithms, however, to the best of ou...

  16. General Consideration on Legal Tax Evasion vs. Tax Fraud

    Directory of Open Access Journals (Sweden)

    Octavia-Daniela Steriopol

    2010-12-01

    Full Text Available The article is a brief overview of tax evasion as a complex social and economicphenomenon, of utmost importance, that today’s states confront with; its consequences seek to limitas much as possible, by legal and fiscal means, the eradication, which, at this point, is virtuallyimpossible. Tax evasion can be analysed from two points of view, the legal and the illegal aspect ofthe phenomenon or the fiscal fraud. The “fiscal paradises” had a very important role in the last years’activity.

  17. Plenty of frauds. Increase of delinquency or better customs controls?

    International Nuclear Information System (INIS)

    D'Erceville, H.

    1997-01-01

    In 1995, the French taxation authorities have identified 1849 violations of law concerning the petroleum products, which correspond to a 53% increase with respect to 1994. The discovery of these frauds has permitted the recovery of 85 millions of French Francs (MFF) of taxes and rights, from which 61.1 MFF correspond to the internal tax on petroleum products (TIPP). In France, the TIPP represents 65% of the customs receipts and about 10% of the gross fiscal receipt of the general budget of the nation. Such delinquency actions can exist at any step of the petroleum file from the production to the storage of petroleum products. (J.S.)

  18. Cressey’s fraud triangle (1953 and agency theory: study applied to brazilian banking institutions

    Directory of Open Access Journals (Sweden)

    Michele Rílany Rodrigues Machado

    2017-08-01

    Full Text Available This research examined if Cressey’s (1953 fraud triangle and the agency theory, jointly, enables investigate corporate fraud occurrence in Brazilian banking institutions. It was formulated  six research hypotheses were segregated in fraud triangle – pressure,  opportunity and rationalization – and measured by variables taken from the agency theory, criminology and empirical papers on corporate fraud. The identification of probability of fraud occurrence was operationalized from multinomial logistic model, applied to data of 44 banking, for the period between January 2001 and December 2012. For element pressure, hypotheses No. 01 was confirmed, since this showed that the lower an institution’s previous performance, the greater probability there is of fraudulent events occurring in the future.  In the element of opportunity, the hypothesis No. 03 was confirmed, which showed that low corporate governance indicators increased the possibility of fraud occurrences.  In rationalization element, the hypothesis No. 08 was confirmed, therefore, the predominance of women in management reduces the probability of fraud.  We thereby conclude that Cressey’s Triangle, when combined with the theory of agency is an appropriate research instrument to use when carrying out an investigation into corporate fraud occurrence in banking institutions.

  19. 75 FR 26196 - Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical Equipment...

    Science.gov (United States)

    2010-05-11

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of Inspector General Publication of OIG Updated Special Fraud Alert on Telemarketing by Durable Medical Equipment Suppliers AGENCY: Office of Inspector...) 205-0007. SUPPLEMENTARY INFORMATION: In our publication of the OIG Updated Special Fraud Alert on...

  20. FAKTOR-FAKTOR YANG MEMENGARUHI PROCUREMENT FRAUD: SEBUAH KAJIAN DARI PERSPEKTIF PERSEPSIAN AUDITOR EKSTERNAL

    Directory of Open Access Journals (Sweden)

    Zulaikha Zulaikha

    2016-12-01

    Full Text Available This study examines factors affecting fraud in the procurement of government’s goods and services from the independent auditor’s point of view. Based on fraud triangles and theory of planned behavior, this study proposes seven hypotheses which were tested using structural equation model (SEM-partial least square. This study used primary data gathered by survey to auditors of Audit Board of the Republic of Indonesia in its head office and several selected representative offices. Respondents were asked to provide their answer/perception for questions in questionnaire regarding factors influencing the procurement fraud of government’s goods and services. The results show that the procurement frauds are significantly influenced by weaknesses in procurement system, lack of procurement committee's quality, and the intention to engage fraud. Furthermore, the intention to engage fraud are influenced by attitude, subjective norms, and the perceived behavioral control. These findings suggest that procurement frauds are associated with individual factors as rationalization and opportunities. These factors could be considered when designing internal control structure to restrain fraud behavior.

  1. Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data

    NARCIS (Netherlands)

    Thornton, Dallas; van Capelleveen, Guido; Poel, Mannes; van Hillegersberg, Jos; Mueller, Roland

    Fraud, waste, and abuse in the U.S. healthcare system are estimated at $700 billion annually. Predictive analytics offers government and private payers the opportunity to identify and prevent or recover such billings. This paper proposes a data-driven method for fraud detection based on comparative

  2. 31 CFR 900.3 - Antitrust, fraud, and tax and interagency claims excluded.

    Science.gov (United States)

    2010-07-01

    ... activity do not apply to any debt based in whole or in part on conduct in violation of the antitrust laws... in whole or in part on conduct in violation of the antitrust laws or any claim involving fraud, the... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Antitrust, fraud, and tax and...

  3. Questionable, Objectionable or Criminal? Public Opinion on Data Fraud and Selective Reporting in Science.

    Science.gov (United States)

    Pickett, Justin T; Roche, Sean Patrick

    2018-02-01

    Data fraud and selective reporting both present serious threats to the credibility of science. However, there remains considerable disagreement among scientists about how best to sanction data fraud, and about the ethicality of selective reporting. The public is arguably the largest stakeholder in the reproducibility of science; research is primarily paid for with public funds, and flawed science threatens the public's welfare. Members of the public are able to make meaningful judgments about the morality of different behaviors using moral intuitions. Legal scholars emphasize that to maintain legitimacy, social control policies must be developed with some consideration given to the public's moral intuitions. Although there is a large literature on popular attitudes toward science, there is no existing evidence about public opinion on data fraud or selective reporting. We conducted two studies-a survey experiment with a nationwide convenience sample (N = 821), and a follow-up survey with a representative sample of US adults (N = 964)-to explore community members' judgments about the morality of data fraud and selective reporting in science. The findings show that community members make a moral distinction between data fraud and selective reporting, but overwhelmingly judge both behaviors to be immoral and deserving of punishment. Community members believe that scientists who commit data fraud or selective reporting should be fired and banned from receiving funding. For data fraud, most Americans support criminal penalties. Results from an ordered logistic regression analysis reveal few demographic and no significant partisan differences in punitiveness toward data fraud.

  4. 25 CFR 700.541 - Fraud or false statement in a Government matter.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Fraud or false statement in a Government matter. 700.541... RELOCATION PROCEDURES Employee Responsibility and Conduct § 700.541 Fraud or false statement in a Government..., applications for employment, personnel security forms, requests for travel reimbursement, client certification...

  5. 49 CFR 1522.3 - Fraud and intentional falsification of records.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS General § 1522.3 Fraud and intentional falsification...

  6. 17 CFR 32.9 - Fraud in connection with commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 32.9 Section 32.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.9 Fraud in connection with commodity...

  7. 17 CFR 240.15c1-2 - Fraud and misrepresentation.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Fraud and misrepresentation. 240.15c1-2 Section 240.15c1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Securities Exchange Act of 1934 Rules Relating to Over-The-Counter Markets § 240.15c1-2 Fraud and...

  8. 17 CFR 33.10 - Fraud in connection with commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with commodity option transactions. 33.10 Section 33.10 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.10 Fraud in...

  9. 49 CFR 1570.5 - Fraud and intentional falsification of records.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fraud and intentional falsification of records...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY GENERAL RULES § 1570.5 Fraud and intentional falsification of records. No person may make, cause to be...

  10. The Effect of the Strictness of Consultation Requirements on Fraud Consultation

    NARCIS (Netherlands)

    Gold, A.H.; Knechel, W.R.; Wallage, P.

    2012-01-01

    We investigate how the strictness of a requirement to consult on potential client fraud affects auditors' propensity to consult with firm experts. We consider two specific forms of guidance about fraud consultations: (1) strict, i.e., mandatory and binding; and (2) lenient, i.e., advisory and

  11. A Review of Financial Accounting Fraud Detection based on Data Mining Techniques

    Science.gov (United States)

    Sharma, Anuj; Kumar Panigrahi, Prabin

    2012-02-01

    With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud, collective known as forensic accounting. Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection. The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field. The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data.

  12. When Good Money Goes Bad: True Stories of Contract Fraud at EPA

    Science.gov (United States)

    In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to contract fraud.

  13. When Good Money Goes Bad: True Stories of Grant Fraud at EPA

    Science.gov (United States)

    In an effort to provide you with tools to identify areas that may be of concern or worth looking into, this booklet was designed to provide an overview of general fraud indicators as well as highlight some specific indicators related to grant fraud.

  14. You've been warned: Consumer liability in Internet banking fraud

    NARCIS (Netherlands)

    van der Meulen, N.S.

    2013-01-01

    This contribution provides a critical analysis of the treatment of consumer liability in cases of Internet banking fraud. Whereas generally banks refund the financial losses associated with Internet banking fraud to the individual victim, exceptions do occur, at least in certain EU jurisdictions.

  15. Neoliberal Moral Economy: Capitalism, Socio-cultural Change and Fraud in Uganda

    DEFF Research Database (Denmark)

    Ponte, Stefano

    2017-01-01

    Book review of: Neoliberal Moral Economy: Capitalism, Socio-Cultural Change & Fraud in Uganda by Jörg Wiegratz. London and New York, Rowman & Littlefield, 2016, 375 pp. ISBN 9781783488537.......Book review of: Neoliberal Moral Economy: Capitalism, Socio-Cultural Change & Fraud in Uganda by Jörg Wiegratz. London and New York, Rowman & Littlefield, 2016, 375 pp. ISBN 9781783488537....

  16. 45 CFR 149.41 - Consequences of Non-Compliance, Fraud, or Similar Fault.

    Science.gov (United States)

    2010-10-01

    ... Fault. 149.41 Section 149.41 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS... Eligible Employment-Based Plans § 149.41 Consequences of Non-Compliance, Fraud, or Similar Fault. Upon failure to comply with the requirements of this part, or if fraud, waste, and abuse, or similar fault are...

  17. An Analysis on Combating Vat Fraud in The European Union Using New IT Technologies

    Directory of Open Access Journals (Sweden)

    Lixăndroiu R.

    2009-12-01

    Full Text Available European VAT fraud has been growing at an alarming rate [2]. The level of VAT losses for one year is between €60bn and €100bn for all member states. This level of fraud has created an urgent need for Europe to address the issue of the reform of the VAT system.

  18. Apps for Ancient Civilizations

    Science.gov (United States)

    Thompson, Stephanie

    2011-01-01

    This project incorporates technology and a historical emphasis on science drawn from ancient civilizations to promote a greater understanding of conceptual science. In the Apps for Ancient Civilizations project, students investigate an ancient culture to discover how people might have used science and math smartphone apps to make their lives…

  19. Refractions of Civil Society

    DEFF Research Database (Denmark)

    Kuzmanovic, Daniella

    The thesis investigates various perceptions of civil society among civic activists in Turkey, and how these perceptions are produced and shaped. The thesis is an anthropological contribution to studies of civil society in general, as well as to studies on political culture in Turkey....

  20. Civil engineering work

    International Nuclear Information System (INIS)

    Cousyn, Rene; Goubin, Jean.

    1977-01-01

    Although it does not require a specifically new technicality, the Civil Engineering site of a nuclear power plant is a complex work. Considering as an example the power plant currently in construction at Tricastin, the authors describe the main Civil Engineering work and task organization applied to carry it out [fr

  1. Geometric procedures for civil engineers

    CERN Document Server

    Tonias, Elias C

    2016-01-01

    This book provides a multitude of geometric constructions usually encountered in civil engineering and surveying practice.  A detailed geometric solution is provided to each construction as well as a step-by-step set of programming instructions for incorporation into a computing system. The volume is comprised of 12 chapters and appendices that may be grouped in three major parts: the first is intended for those who love geometry for its own sake and its evolution through the ages, in general, and, more specifically, with the introduction of the computer. The second section addresses geometric features used in the book and provides support procedures used by the constructions presented. The remaining chapters and the appendices contain the various constructions. The volume is ideal for engineering practitioners in civil and construction engineering and allied areas.

  2. Civil War and Inoperativity

    DEFF Research Database (Denmark)

    Flohr, Mikkel

    2017-01-01

    This article analyses the penultimate publication in Giorgio Agambens Homo Sacer-series Stasis: Civil War as a Political Paradigm. It compares and contrasts the paradigm of civil war with the preceding paradigm of the exception, and identifies a significant displacement in the relationship between...... civil war and the sovereign state, in spite of Agamben’s insistence on their continuity. Agamben’s decoupling of civil war and the sovereign state facilitates novel political possibilities that unfortunately remain underdeveloped in the book. The article proceeds to develop Agamben’s brief intimations...... of inoperativity towards a concept of destituent power drawing on his other writings. It makes the argument for thinking civil war and inoperativity – stasis and stasis – together to derive a concept of destituent power as a form of revolution against the sovereign state, which does not constitute a new sovereign...

  3. Reconceptualizing Civil Regulation

    DEFF Research Database (Denmark)

    Galang, Roberto Martin; Castello, Itziar

    2011-01-01

    This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility litera....... Finally, we argue that, in Asia, governments act as a structuration mechanism which challenges the current understanding of CSR.......This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility...... and environmental standards; but also that local, small and medium companies play a key role in the development of Asian civil regulation. We call this second finding the “CSR importation trap”. Our findings are supported by evidence on the limitations in the interchangeable properties of business and governments...

  4. ‘They’re Very Lonely’: Understanding the Fraud Victimisation of Seniors

    Directory of Open Access Journals (Sweden)

    Cassandra Cross

    2016-12-01

    Full Text Available There are many theories which seek to explain fraud victimisation. In particular, older victims find themselves at the intersection of various discourses which account for victimisation, primarily from a deficit model. This article examines two discourses relevant to older fraud victims. The first positions older victims of crime as weak and vulnerable and the second positions fraud victims generally as greedy and gullible. Using interviews with twenty-one Canadian volunteers who provide telephone support to older fraud victims (all seniors themselves, this article analyses the extent to which these two discourses are evident in the understandings of these volunteers. It finds that volunteers overwhelmingly perceive fraud to occur out of loneliness and isolation of the victim, and actively resist victim blaming narratives towards these individuals. While neither discourse is overly positive, the article discusses the implications of these discourses for the victims themselves and for their ability to access support.

  5. Modeling fraud detection and the incorporation of forensic specialists in the audit process

    DEFF Research Database (Denmark)

    Sakalauskaite, Dominyka

    Financial statement audits are still comparatively poor in fraud detection. Forensic specialists can play a significant role in increasing audit quality. In this paper, based on prior academic research, I develop a model of fraud detection and the incorporation of forensic specialists in the audit...... process. The intention of the model is to identify the reasons why the audit is weak in fraud detection and to provide the analytical framework to assess whether the incorporation of forensic specialists can help to improve it. The results show that such specialists can potentially improve the fraud...... detection in the audit, but might also cause some negative implications. Overall, even though fraud detection is one of the main topics in research there are very few studies done on the subject of how auditors co-operate with forensic specialists. Thus, the paper concludes with suggestions for further...

  6. Avaliação do sistema de combate às fraudes corporativas no Brasil

    Directory of Open Access Journals (Sweden)

    Luiz Carlos Jacob Perera

    2014-01-01

    Full Text Available Este estudio investigó la eficacia del sistema de control interno (SCI en la lucha contra el fraude corporativo. Con el apoyo de una encuesta respondida por 156 profesionales de la auditoría fue posible tener ámbito nacional. Entre los principales resultados, se encontró que las actividade s relacionadas con SCI han desempeñado sus funciones de manera eficiente para combatir el fraude corporativo. Considerando las tres ramas del Árbol de Fraude : " la corrupción y la malversación de activos, son fraudes que se abordan de manera más eficaz por el canal de denuncias, los controles internos y el compliance; ocurrencia de fraudes en las "declaraciones financieros", por lo general vinculados al alto escalon de las empresas, se perciben con mayor precisión mediante una auditoría externa.

  7. 76 FR 13327 - Defense Federal Acquisition Regulation Supplement; Display of DoD Inspector General Fraud Hotline...

    Science.gov (United States)

    2011-03-11

    ..., Washington, DC 22202-2884. (ii) Department of Homeland Security (DHS) fraud hotline poster identified in... _________ _________ _________ _________ (Contracting Officer shall insert-- (i) Title of applicable Department of Homeland Security fraud hotline...-AG98 Defense Federal Acquisition Regulation Supplement; Display of DoD Inspector General Fraud Hotline...

  8. 76 FR 57671 - Defense Federal Acquisition Regulation Supplement; Display of DoD Inspector General Fraud Hotline...

    Science.gov (United States)

    2011-09-16

    ... the title of the applicable Department of Homeland Security (DHS) fraud hotline poster and Web site(s... General Fraud Hotline Posters AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD... Regulation Supplement (DFARS) to require contractors to display the DoD fraud hotline poster in common work...

  9. Molecular assay to fraud identification of meat products.

    Science.gov (United States)

    Doosti, Abbas; Ghasemi Dehkordi, Payam; Rahimi, Ebrahim

    2014-01-01

    Detection of species fraud in meat products is important for consumer protection and food industries. A molecular technique such as PCR method for detection of beef, sheep, pork, chicken, donkey, and horse meats in food products was established. The purpose of this study was to identification of fraud and adulteration in industrial meat products by PCR-RFLP assay in Iran. In present study, 224 meat products include 68 sausages, 48 frankfurters, 55 hamburgers, 33 hams and 20 cold cut meats were collected from different companies and food markets in Iran. Genomic DNA was extracted and PCR was performed for gene amplification of meat species using specific oligonucleotid primers. Raw meat samples are served as the positive control. For differentiation between donkey's and horse's meat, the mitochondrial DNA segment (cytochrome-b gene) was amplified and products were digested with AluI restriction enzyme. Results showed that 6 of 68 fermented sausages (8.82%), 4 of 48 frankfurters (8.33%), 4 of 55 hamburgers (7.27%), 2 of 33 hams (6.6%), and 1 of 20 cold cut meat (5%) were found to contain Haram (unlawful or prohibited) meat. These results indicate that 7.58% of the total samples were not containing Halal (lawful or permitted) meat and have another meat. These findings showed that molecular methods such as PCR and PCR-RFLP are potentially reliable techniques for detection of meat type in meat products for Halal authentication.

  10. Fragmentos de uma fraude: o caso Binjamin Wilkomirski

    Directory of Open Access Journals (Sweden)

    Pollyanna Gomes dos Santos

    2010-10-01

    Full Text Available A partir da diferenciação entre plágio, fraude e estratégia ficcional, objetiva-se, neste ensaio, analisar a construção de textos literários que tenham uma possível conotação entre escrita e crime. Como afirma Anatol Rosenfeld, a fraude literária é tão antiga quanto a própria literatura. Um dos títulos escolhidos para esta pesquisa é Fragmentos: memórias de uma infância 1939-1948, de Binjamin Wilkomirski. No livro, o autor-narrador relata que foi prisioneiro de campos de concentração e sobrevivente da Segunda Guerra Mundial. Após o enorme sucesso que o livro alcançou e apreciações positivas por parte de críticos literários em todo o mundo, descobriu-se, enfim, que sua história não era verdadeira.

  11. Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems

    Directory of Open Access Journals (Sweden)

    Stylianos S. Mamais

    2017-11-01

    Full Text Available Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to forgery as non-human operators are able to artificially create fictitious traffic on digital platforms for the purpose of committing financial fraud. This places a significant strain on Advertisers who have no effective means of differentiating fabricated Ad-Reports from those which correspond to real consumer activity. To address this problem, we contribute an advert reporting system which utilizes opportunistic networking and a blockchain-inspired construction in order to identify authentic Ad-Reports by determining whether they were composed by honest or dishonest users. What constitutes a user’s honesty for our system is the manner in which they access adverts on their mobile device. Dishonest users submit multiple reports over a short period of time while honest users behave as consumers who view adverts at a balanced pace while engaging in typical social activities such as purchasing goods online, moving through space and interacting with other users. We argue that it is hard for dishonest users to fake honest behaviour and we exploit the behavioural patterns of users in order to classify Ad-Reports as real or fabricated. By determining the honesty of the user who submitted a particular report, our system offers a more secure reward-claiming model which protects against fraud while still preserving the user’s anonymity.

  12. Civil-Military Emergency Planning Council Denver Conference Proceedings

    National Research Council Canada - National Science Library

    Lidy, A

    2000-01-01

    ...) program formed by the North Atlantic Treaty Organization (NATO) since 1990. One small but important element of this engagement program is the use of the Civil-Military Emergency Planning (CMEP...

  13. ANALYSIS OF THE RELATIONSHIP OF THE TRAINING PROGRAM (DIKLATPIM TO INCREASE THE QUALITY OF LEADERSHIP (LEADERSHIP OF CIVIL SERVANTS IN THE OFFICE OF THE LOCAL GOVERNMENT DISTRICT OF AGAM

    Directory of Open Access Journals (Sweden)

    Dina Amaluis

    2015-07-01

    Full Text Available The principal functions of human resources management, there is a function evaluation. Program training as one strategy for human resource development that requires function evaluation to determine the effectiveness of a training Program. On the Organization of the public sector, the implementation of a training Program is set based on the Government Regulation No. 101 in 2000. Training programs for civil servants aims to improve the ability of lead as well as performance improvements. In this study, the intended training program is a level III leadership Training. This research aims to quantify relationships training programme to improve the quality of leadership. Respondents consisted of 96 people level III Leadership Training Program evaluation method using the method of Kirkpatrick & Kirkpatrick. Analysis of the correlation used is simple by looking at the significance of the values between variables. Based on the research results obtained that the only training Program correlates on taraf was strong but not significantly to improve the quality of leadership. From this research can be disimpulan that the organizers of the training program is considered necessary to conduct a training needs Analysis in depth, so knowable Competency Gapsetiap potential participants and prepare a suitable training method to improve the Gap.

  14. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  15. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    scientific activities conducted by the author, partly based on the author's experience as a member, through a number of years, of the Danish Standing Committee on Procedural Law (Retsplejeraadet), which on a continuous basis evaluates the need for civil procedural reforms in Denmark, and finally also based......The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...... procedural questions, including relations to the Brussels I Regulation and Denmark's participation in this Regulation via a parallel convention with the EU countries, impact on Danish civil procedure of the convention on human rights, preparation and pronouncement of judgment and verdict, questions of appeal...

  16. Civil Surgeon Info

    Data.gov (United States)

    Department of Homeland Security — USCIS designates certain doctors (also known as civil surgeons) to perform the medical exam required for most Green Card applicants. This data set represents the...

  17. Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.

    Science.gov (United States)

    Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca

    2017-09-14

    Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.

  18. FRAUD DETECTION LAPORAN KEUANGAN PERUSAHAAN MANUFAKTUR YANG TERDAFTAR DI BURSA EFEK NDONESIA

    Directory of Open Access Journals (Sweden)

    Indarti Inova Fitri Siregar Nurhayani Lubis

    2016-03-01

    Full Text Available Abstrak : Penelitian ini bertujuan untuk menganalisis pendeteksian laporan keuangan dengan menggunakan Leverage, Financial Stability, dan Financial Targets, studi Empiris pada Perusahaan Manufaktur yang terdaftar di Bursa Efek Indonesia untuk tahun laporan 2012 sampai dengan 2014. Mengingat pentingnya peran yang dimiliki oleh laporan keuangan, maka hanya laporan keuangan berkualitas dan terbebas dari salah saji material baik yang disengaja (fraud maupun yang tidak disengaja (error yang dapat dipercaya sebagai sumber informasi untuk pengambilan keputusan. Untuk itu sebagai tujuan jangka panjangnya adalah agar setiap perusahaan dapat mendeteksi laporan keuangannya secara dini oleh bagian internal kontrol atau bagian internal audit perusahaannya agar terhindar dari kemungkinan kecurangan penyajian Laporan Keuangan.Adapun objek yang menjadi penelitian ini Laporan Keuangan yang terdaftar di Bursa Efek Indonesia. Populasi dalam penelitian ini adalah Perusahaan Manufaktur yang terdaftar di Bursa Efek Indonesia untuk tahun laporan 2012 sampai dengan 2014.  Sampel pada penelitian ini dipilih berdasarkan metode  purposive sampling dengan  jumlah  populasi  sebanyak  134  perusahaan  dan  sampel  sebanyak  20 perusahaan.  Metode  analisis  yang  digunakan  adalah  analisis  regresi  berganda dengan program SPSS versi 20. Teknik analisis yang digunakan pada penelitian ini  adalah  analisis  statistik  deskriptif,  uji  asumsi  klasik,  uji  hipotesis  F-statistik untuk  menguji  pengaruh  secara  bersama-sama  dengan  tingkat  kepercayaan  5% serta  menggunakan  t-statistik  untuk  menguji  koefisien  regresi  parsial. Penelitian ini dilakukan untuk menganalisis seberapa besar pengaruh Leverage, Financial stability pressure, dan Financial Targets terhadap Fraud Detection pada pelaporan keuangan dengan menggunakan Manajemen Laba Riil.Hasil penelitian  ini  menunjukkan  bahwa  secara  simultan  Leverage

  19. 78 FR 46339 - Medicare, Medicaid, and Children's Health Insurance Programs: Announcement of Temporary Moratoria...

    Science.gov (United States)

    2013-07-31

    ...] Medicare, Medicaid, and Children's Health Insurance Programs: Announcement of Temporary Moratoria on... combat fraud, waste, and abuse in Medicare, Medicaid, and the Children's Health Insurance Program (CHIP... Health Insurance Programs; Additional Screening Requirements, Application Fees, Temporary Enrollment...

  20. Nuclear energy and civilization

    International Nuclear Information System (INIS)

    Soentono, S.

    1996-01-01

    The role of energy is indeed very important since without it there will be no living-things in this world. A country's ability to cultivate energy determines the levels of her civilization and wealth. Sufficient energy supply is needed for economic growth, industrialization, and modernization. In a modern civilization, the prosperity and security of a country depends more on the capability of her people rather than the wealth of her natural resources. Energy supplies the wealth, prosperity and security, and sufficient reliable continuous supply of energy secures the sustainable development. The energy supply to sustain the development has to improve the quality of life covering also the quality of environment to support the ever increasing demand of human race civilization. Energy has a closer relationship with civilization in a modern society and will have to become even closer in the future more civilized and more modern society. The utilization of nuclear energy has, however, some problems and challenges, e.g. misleading information and understanding which need serious efforts for public information, public relation, and public acceptance, and possible deviation of nuclear materials for non-peaceful uses which needs serious efforts for technological and administrative barriers, precaution, prevention, safety, physical protection, safeguard, and transparency. These require cooperation among nuclear community. The cooperation should be more pronounced by heterogeneous growing Asian countries to reach harmony for mutual benefits toward better civilization. (J.P.N.)

  1. WNP-2, securities fraud investigation are fired up

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    Washington's WNP-2 nuclear plant faces a securities fraud investigation just as it is ready to start operating on schedule. The investigation's outcome and WNP-2's performance will determine whether WNP-1 and WNP-3 will be financed. Angry bondholders who did not receive interest on their investments in January prompted Congressional hearings, at which it was learned that institutional buyers had pulled out of the Washington Public Power Supply System project and unloaded the bonds on thousands of unsuspecting individuals for whom tax-free municipal bonds are inappropriate. Securities Exchange Commission investigators will focus on the initial offering and disclosure by the issuer to determine if the Wall Street unloading was legal

  2. The bribery statute: a new weapon against Medicare fraud.

    Science.gov (United States)

    Cozort, L A

    2001-03-01

    A May 2000 U.S. Supreme Court decision determining when a Federal bribery statute can be used to fight Medicare fraud has ramifications for healthcare providers. In Fischer v. United States, the Court concluded that healthcare providers that participate in Medicare are considered to receive benefits as set forth in the bribery statute and thus can be prosecuted for fraudulent activities against the government under the statute. The statute mandates a fine, imprisonment for up to 10 years, or both for anyone convicted under it. Provider organizations that receive Medicare payments and business associates of such organizations should be aware that the government may step up its use of the bribery law in prosecuting fraudulent activity. In addition, although the case pertained specifically to healthcare providers that participate in Medicare, providers that do not participate in Medicare may wish to evaluate the advisability of accepting other Federal funding because of the possible reach of the bribery statute.

  3. Pattern analysis of fraud case in Taiwan, China and Indonesia

    Science.gov (United States)

    Kusumo, A. H.; Chi, C.-F.; Dewi, R. S.

    2017-11-01

    The current study analyzed 125 successful fraud cases happened in Taiwan, China, and Indonesia from 2008 to 2012 published in the English online newspapers. Each of the case report was coded in terms of scam principle, information media (information exchange between fraudsters and victim), money media (media used by fraudsters to obtain unauthorized financial benefit) and other additional information which was judged to be relevant. The Chi-square Automatic Interaction Detector (CHAID) was applied to the coded data of information, scam principle and money media to find a subset of predictors that might derive meaningful classifications. A series of flow diagrams was constructed based on CHAID result to illustrate the flow of information (scam) travelling from information media to money media.

  4. Persuasion, self-confidence and resistance : a dual-processing perspective on consumer fraud

    OpenAIRE

    Caldas, Lucas Soares

    2014-01-01

    A fraude é uma prática comum em todo o mundo, sempre envolvendo um agente que usa meios escusos para enganar e obter benefícios à custa de outros. Em grande parte subnotificado devido ao constrangimento social, fraudes são difíceis de prevenir porque mudam rapidamente. No entanto, os processos de influência social por trás deste fenômeno mudam pouco. Pessoas são vítimas de golpes e fraudes contra o consumidor diariamente, no entanto, na maioria dos casos, a vítima poderia ter detectado a frau...

  5. Approaches for Establishing Fraud Risk Assessment Programs and Conducting Fraud Audit Risk Assessments Within the Department of Defense

    Science.gov (United States)

    2014-07-17

    the day are not locked. 3. Pilfering vending merchandise 4. Misuse of government vehicles vending house exterior door, office doors and the... merchandise for the day. The merchandise is verified by a Gap: Documentation of unannounced change fund counts is not maintained. 10. Inaccurate...colors. A simple heat map provides an immediate visual summary of information. Source: SearchBusinessAnalytics.com 64 │ DODIG-2014-094 Approaches for

  6. CIVIL LAW AND THE DISREGARD OF THE LEGAL PERSONALITY OF COMPANIES LTDA

    Directory of Open Access Journals (Sweden)

    L. H. T. Macarenhas

    2016-07-01

    Full Text Available This paper will address the importance that the legal person has the right to and for society, the legal system itself has instruments to protect such institute, correcting fraud and abuse in its exercise. Through the theory of piercing the corporate veil, the distinctive personality and patrimonial autonomy are removed temporarily, making partners and managers are held accountable, as if the entity does not exist. The integration of theory disregard the Civil Code of 2002 is not about real innovation, because its application was already a reality in the Brazilian courts, even if the regulatory provisions dealing hitherto disregard of the doctrine were so confused and often sometimes even erroneous.

  7. European Funds Fraud: The Impact on the Process of Absorption of Structural and Cohesion Funds in Romania

    Directory of Open Access Journals (Sweden)

    Dumitru BELDIMAN

    2016-06-01

    Full Text Available The increase of the degree of absorption of European funds offered to Romania by the European Union represents one of its main objectives in the present and future situation. One of the main reasons that the funds are so important is the fact that, taking into consideration the microeconomic and macroeconomic situation that Romania is in, it represents an alternative financing mechanism of the economy that Romania can benefit in very advantageous conditions. Even under these conditions Romania- within 2007-2013 period of programming – couldn’t benefit from it by attracting as many structural and cohesion funds as possible, at least in comparison to other member states. In our opinion, that of the authors’ one of the reasons that led to such a low rate of absorption, alongside with the low administrative capacity of the state is the excessive bureaucracy, an inefficient legislative framework which is not harmonized with the European one, the lack of experience in using and administrating of European funds, the beneficiaries’ incapacity to sustain the financial support of the project (to assure the co-financing of the project, a low involvement of Romanian banking institutions in the process of supporting the beneficiaries of European funds. Another cause is the European funds fraud that happened in Romania. In the present article, the authors have decided to analyze the influence of European funds fraud on the degree of absorption of structural and cohesion funds in Romania.

  8. PENGARUH PENGALAMAN DAN PROFESIONALISME AKUNTAN FORENSIK TERHADAP KUALITAS BUKTI AUDIT GUNA MENGUNGKAP FRAUD

    Directory of Open Access Journals (Sweden)

    Rozmita Dewi Yuniarti R

    2015-04-01

    Full Text Available The purpose of this study is to find out how the influence of forensic accountant's experience and professionalism on the quality of audit evidence to reveal fraud. Hypothesis in this research is experience of forensic accountant have positive effect to quality of audit evidence to reveal fraud and professionalism of forensic accountant have positive effect to quality of audit evidence to reveal fraud. The research method used is associative method. While the technique of data analysis using correlation coefficient analysis and coefficient of determination analysis. Quantitative data is the primary data. Primary data in the form of questionnaires collected from forensic accountants at the Representative Board of Finance and Development of West Java Province. The results showed that forensic accountant experience and forensic accountant professionalism positively influence the quality of audit evidence to reveal fraud

  9. Percepciones estudiantiles sobre el fraude académico: hallazgos y reflexiones pedagógicas.

    Directory of Open Access Journals (Sweden)

    Claudia Lucía Ordóñez

    2006-04-01

    Full Text Available The present article gives information about the findings of the third stage of a research project on academic fraud that has been conducted by the Centro de Investigación y Formación en Educación, CIFE, from the Andes University, Bogotá, with the purpose of developing interventions to fight it. Facing upsetting findings in the first two stages about the frequency of fraudulent behaviors and the reasons given by the students to justify academic fraud, we conducted a detailed qualitative study that analyzes these reasons. From the results we propose a cultural explanation for students' decisions on academic fraud, instead of one that only takes into account factors related to individual moral development. Then we use constructivist learning principles and their possible applications to support the need to fight against academic fraud from pedagogical change.

  10. PENGARUH PERILAKU TIDAK JUJUR DAN KOMPETENSI MORAL TERHADAP KECURANGAN AKADEMIK (ACADEMIC FRAUD MAHASISWA AKUNTANSI

    Directory of Open Access Journals (Sweden)

    Dyon Santoso

    2017-02-01

    Full Text Available The objectives of this research is to analyze and provide empirical proves about the influences of dishonesty behavior dan moral competence towards academic fraud of accounting students. The variable used in the research are dishonesty behavior and moral competence. The population of the research is the accounting students from Trisakti University, Bina Nusantara University, and Indonesia Banking School. 242 respondents has been involved as sampels in the research. Data used in the research consist of primary data collected using a questionaire.  Multiple regression analysis will be used in the data analysis to test the hypotheses, and the data will be tested using the 20 version of SPSS The result of the test shows us that dishonesty behavior is proven to have an effect on the academic fraud of accounting students. While moral competence has not shown an effect on the academic fraud of accounting students. Key words : Dishonesty Behavior, Moral Competence, Academic Fraud

  11. 77 FR 32645 - Revision of Performance Standards for State Medicaid Fraud Control Units

    Science.gov (United States)

    2012-06-01

    ... familiar with, and adhere to, policies and procedures. To determine whether a Unit meets this standard, OIG... provide training on the elements of successful fraud referrals and receive training on the role and...

  12. Civil Law Legal Assistance: Lawyers Study Guide

    National Research Council Canada - National Science Library

    1999-01-01

    .... Some topics discussed in this volume include interviewing and client counseling, preventive law programs, estate planning, family support, family law, separation agreements, consumers laws, income tax law, and a discussion of legislation such as the Soldiers and Sailors Civil Relief Act and the Uniformed Services Former Spouses Protection Act.

  13. The model of fraud detection in financial statements by means of financial ratios

    OpenAIRE

    Kanapickienė, Rasa; Grundienė, Živilė

    2015-01-01

    Analysis of financial ratios is one of those simple methods to identify frauds. Theoretical survey revealed that, in scientific literature, financial ratios are analysed in order to designate which ratios of the financial statements are the most sensitive in relation with the motifs of executive managers and employees of companies to commit frauds. Empirical study included the analysis of the following: 1) 40 sets of fraudulent financial statements and 2) 125 sets of non-fraudulent financ...

  14. Force, fraud, and coercion : Bridging from knowledge of intercountry adoption to global surrogacy

    OpenAIRE

    Smith Rotabi, K.

    2014-01-01

    This report discusses concerns raised by participants of Thematic Area 4 (Force, Fraud and Coercion) of the International Forum on Intercountry Adoption and Global Surrogacy held in August 2014. There has been a significant body of research on intercountry adoption practices over the past 30 years; force, fraud, and coercion have been identified in a small but important component of the literature. However, this knowledge in intercountry adoption has not yet truly bridged into research in glo...

  15. Force, fraud, and coercion : Bridging from knowledge of intercountry adoption to global surrogacy

    OpenAIRE

    Smith Rotabi, Karen; Cheney, Kristen

    2014-01-01

    textabstractThis report discusses concerns raised by participants of Thematic Area 4 (Force, Fraud and Coercion) of the International Forum on Intercountry Adoption and Global Surrogacy held in August 2014. There has been a significant body of research on intercountry adoption practices over the past 30 years; force, fraud, and coercion have been identified in a small but important component of the literature. However, this knowledge in intercountry adoption has not yet truly bridged into res...

  16. Training for Success: A Comparison of Anti-Fraud Knowledge Competencies

    Science.gov (United States)

    2014-12-01

    revised is submitted for inclusion in that year’s edition of the manual. In addition, new information can be submitted from SMEs in the field. The...justify the inclusion of additional fraud knowledge competencies into mandatory follow- on training for all individuals selected to fill the role of fraud...committee. Revista Europea de Dirección y Economía de la Empresa [European Journal of Management and Business Economics], 19(3): 89–112, 173

  17. Percepciones públicas del fraude electoral en México

    OpenAIRE

    Andreas Schedler

    1999-01-01

    After a long history of electoral fraud, Mexicana entered the 1990s with deep skepticism towardspolitical elections. Subsequent electoral reforma succeeded to bring fraud under control. How did Mexican citizens react to these institutional changes f Did they hibernate under theprotectivecover of un unchanging "culture ofdistrust"? Or did they adapt their expectations to thenew realities? Thearticlesupports the hypothesis ofchange. Analyzing a set of formerly disperse opinwn poli data, it arri...

  18. No evidence of the effect of the interventions to combat health care fraud and abuse: a systematic review of literature.

    Science.gov (United States)

    Rashidian, Arash; Joudaki, Hossein; Vian, Taryn

    2012-01-01

    Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan) were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.

  19. No evidence of the effect of the interventions to combat health care fraud and abuse: a systematic review of literature.

    Directory of Open Access Journals (Sweden)

    Arash Rashidian

    Full Text Available BACKGROUND: Despite the importance of health care fraud and the political, legislative and administrative attentions paid to it, combating fraud remains a challenge to the health systems. We aimed to identify, categorize and assess the effectiveness of the interventions to combat health care fraud and abuse. METHODS: The interventions to combat health care fraud can be categorized as the interventions for 'prevention' and 'detection' of fraud, and 'response' to fraud. We conducted sensitive search strategies on Embase, CINAHL, and PsycINFO from 1975 to 2008, and Medline from 1975-2010, and on relevant professional and organizational websites. Articles assessing the effectiveness of any intervention to combat health care fraud were eligible for inclusion in our review. We considered including the interventional studies with or without a concurrent control group. Two authors assessed the studies for inclusion, and appraised the quality of the included studies. As a limited number of studies were found, we analyzed the data using narrative synthesis. FINDINGS: The searches retrieved 2229 titles, of which 221 full-text studies were assessed. We found no studies using an RCT design. Only four original articles (from the US and Taiwan were included: two studies within the detection category, one in the response category, one under the detection and response categories, and no studies under the prevention category. The findings suggest that data-mining may improve fraud detection, and legal interventions as well as investment in anti-fraud activities may reduce fraud. DISCUSSION: Our analysis shows a lack of evidence of effect of the interventions to combat health care fraud. Further studies using robust research methodologies are required in all aspects of dealing with health care fraud and abuse, assessing the effectiveness and cost-effectiveness of methods to prevent, detect, and respond to fraud in health care.

  20. Civil society sphericules

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2014-01-01

    the organization strategizes about and seeks to articulate amongst Tanzanian youth. Situated in the ‘perverse confluence’ (Dagnino, 2011) between neoliberal and radical democratic agendas in the communicative practices of civil society-driven media platforms, Femina navigates between identities as an NGO, a social...... movement and a media initiative. In the context of the growing literature on social networking sites and their affordances, dynamics and structures, the case of Femina illustrates how a civil society sphericule emerges within the dynamic co-evolution of new and old media platforms. The study is furthermore...... an example of the difficult shift in civil society practice, from service provision to an agenda of public service monitoring, social accountability and community engagement....

  1. Producing Civil Society

    DEFF Research Database (Denmark)

    Feldt, Liv Egholm; Hein Jessen, Mathias

    Since the beginning of the 1990’s, civil society has attracted both scholarly and political interest as the ‘third sphere’ outside the state and the market not only a normatively privileged site of communication and ‘the public sphere’, but also as a resource for democratization processes...... and social cohesion, as well as a provider of welfare services from a welfare state in dire straits. However, such a view upholds a sharp distinction between the three sectors and their distinct logic. This article claims that the separation of spheres is a fundamental part of our ‘social imaginary......’ and as such dominates our way of thinking about civil society. Yet, this view hinders the understanding of how civil society is not a pre-existing or given sphere, but a sphere which is constantly produced both discursively, conceptually and practically. Through two examples; 1,the case of philanthropy in the beginning...

  2. An Overview of the Legal framework of Advanced Fee Fraud and Cybercrime in Nigeria

    Directory of Open Access Journals (Sweden)

    Mu’azu Abdullahi Saulawa

    2016-08-01

    Full Text Available The paper seeks to discuss an overview on the advanced fee fraud offences as well as cybercrime in Nigerian. The aims of the paper focus on discussing the advanced fee fraud under the related provisions of Advanced Fee Fraud Act 2006 on the success of the law in addressing the practices of crimes in relation to information technology. The paper also discusses the cybercrimes in Nigeria with a brief look out on the Cybercrime (Prohibition and Prevention Act 2015. Further, it also aims at examining the application of the law in the fraud offences which raises an issue of the regulatory framework of the cybercrime. The methodology adopted by the paper is doctrinal approach method wherein both primary and secondary sources of data were analysed, particularly the local laws and other relevant documents. The finding of the paper reveals that the relevant section of the in the Advanced Fee Fraud Act that deals with electronic communication has not been invoked. This is because the discussed relevant law under the advanced fee fraud did not in any away deal with cases concerning electronic communication under section 13. The paper recommends that there is a need to strengthen the adequacy of the legal framework on the Cybercrimes so as to checkmate such practices in Nigeria.

  3. THE ROLE OF TECHNOLOGY IN COMBATTING BANK FRAUDS: PERSPECTIVES AND PROSPECTS

    Directory of Open Access Journals (Sweden)

    Madan Lal BHASIN

    2016-08-01

    Full Text Available Banks are the engines that drive the operations in the financialsector, money markets and growth of an economy. With the rapidly growingbanking industry in India, frauds in banks are also increasing very fast, andfraudsters have started using innovative methods. As part of the study, a questionnaire-basedsurvey was conducted in 2013-14 among 345 bank employees to know theirperception towards bank frauds and evaluate the factors that influence thedegree of their compliance level. This study provides a frank discussion of theattitudes, strategies and technology that specialists will need to combatfrauds in banks. In the modern era, there is “no silver bullet for fraudprotection; the double-edged sword of technology is getting sharper,day-in-day-out.” The use of neural network-based behavior models in real-timehas changed the face of fraud management all over the world. Banks that canleverage advances in technology and analytics to improve fraud prevention willreduce their fraud losses. Recently, forensic accounting has come into limelightdue to rapid increase in financial frauds or white-collar crimes.

  4. An examination of actual fraud cases with a focus on the auditor's responsibility

    DEFF Research Database (Denmark)

    Holm, Claus; Langsted, Lars Bo; Seehausen, Jesper

    The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit engageme......The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit...... engagements has been widely discussed over the years. In this paper we classify actual cases, where the responsibilities of auditors have been established by the court system and/or by the auditors own professional organizations in Denmark. The dataset includes all publicized cases raised against Danish...... auditors within the time period 1909-2006. The information provided in the cases provides a basis for identifying the actual responsibilities pertaining to fraud during the audit. The overall finding of the historical analysis is that the responsibilities of the auditor in relation to fraud should...

  5. The effect of internal audit effectiveness, auditor responsibility and training in fraud detection

    Directory of Open Access Journals (Sweden)

    George Drogalas

    2017-12-01

    Full Text Available The purpose of this study is to explore the relationship between internal audit effectiveness, internal auditor’s responsibility, training and fraud detection. During the last decade internal auditing has become an integral part of modern businesses since it is capable of detecting errors or offences which lead to fraud. In order to investigate the above relationship, we conducted a survey of companies listed in the Athens Stock Exchange. We used factor analysis to validate the survey instrument and to construct our variables measuring fraud detection, internal audit effectiveness, auditor responsibility and training. We used regression analysis to test for significance between the constructed variables. Our analysis shows that audit effectiveness, auditor responsibility and auditor training affect positively and significantly the detection of fraud. Our results highlight the importance of internal audit in detecting accounting fraud and the need of companies to invest on internal audit processes and training in order to achieve enhanced corporate performance. Finally, our research stresses the importance of internal audit and fraud detection for companies which operate in countries which are in a period of economic crisis.

  6. An Examination of Actual Fraud Cases With a Focus on the Auditor's Responsibility

    DEFF Research Database (Denmark)

    Holm, Claus; Langsted, Lars Bo; Seehausen, Jesper

    The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit engageme......The purpose of this paper is to contribute to an understanding of the intricate relationship between audit regulation and developments in audit practice in relation to the fraud issue. The extent and exact nature of the responsibilities of the auditor to detect fraud in relation to audit...... engagements has been widely discussed over the years. In this paper we classify actual cases, where the responsibilities of auditors have been established by the court system and/or by the auditors own professional organizations in Denmark. The dataset includes all publicized cases raised against Danish...... auditors within the time period 1909-2006. The information provided in the cases provides a basis for identifying the actual responsibilities pertaining to fraud during the audit. The overall finding of the historical analysis is that the responsibilities of the auditor in relation to fraud should...

  7. Engaging Civil Society in Countering Violent Extremism

    Directory of Open Access Journals (Sweden)

    Bibi van Ginkel

    2012-08-01

    Full Text Available In this Research Paper Dr. Bibi van Ginkel takes an in depth look at how multi-lateral institutions, engage with civil society to counter violent extremism. Dr. van Ginkel argues that civil society can play a crucial role in preventing and countering violent extremism in numerous ways – by working on development programs, through their work in conflict transformation, in providing a platform to raise political grievances and to facilitate dialogue, or through their work in empowering victims and survivors of terrorism. The Paper finds that over the last decade there has been a more intensive coordination of activities between the UN and other multi-lateral organisations and civil society but the question remains whether the implementation as well as the drafting of these policies will live up to their potential effectiveness. This Paper gauges how effective these measures have been and what more there is to do. The final section concludes with a series of policy recommendations.

  8. CIVIL RIGHTS AND MINORITIES.

    Science.gov (United States)

    HARTMAN, PAUL

    A MAJOR INTENT OF THE CONSTITUTION AND ITS AMENDMENTS, TO GUARANTEE EQUAL RIGHTS TO ALL CITIZENS REGARDLESS OF RACE, CREED, OR COLOR, HAS BEEN REINFORCED BY THE CIVIL RIGHTS STATUTES OF MANY STATES. IN SOME STATES SUCH LAWS HAVE BEEN ON RECORD FOR THREE-QUARTERS OF A CENTURY. IN OTHER STATES THE SAME CONSTITUTIONAL INTENT HAS BEEN DENIED BY…

  9. Civil Law and Neuroscience

    NARCIS (Netherlands)

    de Kogel, C.H.; Schrama, W.M.; Smit, M.

    2014-01-01

    The relationship between the brain and human behaviour is receiving increasing attention in legal practice. Much has already been published about the role of neuroscience in criminal law, but surprisingly little is known about its role in civil law. In this contribution, the relevance of

  10. Nuclear damage - civil liability

    International Nuclear Information System (INIS)

    Simoes, A.C.

    1980-01-01

    An analysis is made of the civil liability for nuclear damage since there is a need to adjust the existing rules to the new situations created. The conventions that set up the new disciplining rules not considered in the common law for the liability of nuclear damage are also mentioned. (A.L.) [pt

  11. Creative Ventures: Ancient Civilizations.

    Science.gov (United States)

    Stark, Rebecca

    The open-ended activities in this book are designed to extend the imagination and creativity of students and encourage students to examine their feelings and values about historic eras. Civilizations addressed include ancient Egypt, Greece, Rome, Mayan, Stonehenge, and Mesopotamia. The activities focus upon the cognitive and affective pupil…

  12. Digital forensic technologies as e-fraud risk mitigation tools in the banking industry: Evidence from Zimbabwe

    Directory of Open Access Journals (Sweden)

    Shewangu Dzomira

    2014-07-01

    Full Text Available The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry. The paper is based on a descriptive study which studied digital forensics and cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that fraud detection and prevention tools and technologies would be most effective way of combating e-fraud if they can be utilized. It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application to get more efficient oversight

  13. THEORETICAL AND PRACTICAL ASPECTS OF THE OFFENSE OF BANKRUPTCY FRAUD

    Directory of Open Access Journals (Sweden)

    Mihaela Narcisa Stoicu

    2012-12-01

    Full Text Available Bankruptcy is a legal concept that emerged and developed in the business environment, along with other concepts such as: insolvency, debtor, creditor, etc. Simple bankruptcy or bankruptcy fraud do not have a legal definition, but their analysis cannot be made without considering the legal norms governing the procedure of insolvency. The legal regime applicable to insolvent debtors is of general interest, due to the economic and financial effects manifested upon the business environment, with direct influences on the national economy. The insolvency procedure is regulated by Law 85/2006 and aims to establish a collective procedure for covering the liabilities of insolvent debtors. Insolvency is the state of the debtor's assets that is characterized by lack of available funds for the payment of certain, liquid and exigible debt. Therefore, non-payment of debt on maturity must be the effect of the debtor’s incapacity to pay the debt with the available sums of money, incapacity which must be caused by an external and objective situation, namely the cessation of payments.

  14. Re-thinking civil disobedience

    Directory of Open Access Journals (Sweden)

    Theresa Züger

    2013-11-01

    Full Text Available This article points out a struggle of today’s societies with the traditional concepts of civil disobedience and stresses the need for reevaluation of the concept of civil disobedience for policy making and public discourse. Starting with a minimal definition of civil disobedience, the article introduces Hannah Arendt’s approach for a legitimisation of civil disobedience and discusses her ideas for digital actions, which are increasingly framed as digital forms of civil disobedience. Addressing WikiLeaks as an example of digital civil disobedience, the author problematises the internal secrecy of WikiLeaks and the focus on Julian Assange as a single decision-maker. Both aspects challenge Arendt’s understanding of legitimate civil disobedience. Even though traditional criteria of civil disobedience need to be revisited in the digital age, organisations or disobedience actors might themselves in their actions be well-advised to comply with the principles they fight for.

  15. Civil partnerships five years on.

    Science.gov (United States)

    Ross, Helen; Gask, Karen; Berrington, Ann

    2011-01-01

    The Civil Partnership Act 2004, which came into force in December 2005 allowing same-sex couples in the UK to register their relationship for the first time, celebrated its fifth anniversary in December 2010. This article examines civil partnership in England and Wales, five years on from its introduction. The characteristics of those forming civil partnerships between 2005 and 2010 including age, sex and previous marital/civil partnership status are examined. These are then compared with the characteristics of those marrying over the same period. Further comparisons are also made between civil partnership dissolutions and divorce. The article presents estimates of the number of people currently in civil partnerships and children of civil partners. Finally the article examines attitudes towards same-sex and civil partner couples both in the UK and in other countries across Europe.

  16. 77 FR 55175 - Civil Penalties

    Science.gov (United States)

    2012-09-07

    ... [Docket No. NHTSA-2012-0131; Notice 1] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations of motor vehicle safety requirements... and consumer information provisions. Specifically, this proposes increases in maximum civil penalty...

  17. 75 FR 79978 - Civil Penalties

    Science.gov (United States)

    2010-12-21

    ... [Docket No. NHTSA-2010-0114; Notice 2] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for related series of violations of the National Traffic and Motor Vehicle Safety... Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as amended by the Debt Collection...

  18. 75 FR 5244 - Civil Penalties

    Science.gov (United States)

    2010-02-02

    ... [Docket No. NHTSA-2009-0066; Notice 2] RIN 2127-AK40 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements involving school buses, bumper... theft protection requirements. This action is taken pursuant to the Federal Civil Monetary Penalty...

  19. 77 FR 70710 - Civil Penalties

    Science.gov (United States)

    2012-11-27

    ... [Docket No. NHTSA-2012-0131; Notice 2] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements for the National Traffic and... provisions. Specifically, this increases the maximum civil penalty amounts for single violations of motor...

  20. 75 FR 49879 - Civil Penalties

    Science.gov (United States)

    2010-08-16

    ... [Docket No. NHTSA-2010-0114; Notice 1] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations covering a related series of... action would be taken pursuant to the Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as...

  1. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  2. Departamento de Obras Civiles

    Directory of Open Access Journals (Sweden)

    Director Departamento de Obras Civiles

    1984-12-01

    Full Text Available Es la unidad académica que se crea como estructura básica para la formación profesional del Constructor Civil. El departamento está orientado a las siguientes áreas: Obras Viales, Fluviales y Marítimas; Hormigones y Mecánica de Suelos; Laboratorios y Control de Calidad; Planificación y Programación; Administración; Organización y Gestión Financiera, conocimientos insertos en un total de 33 asignaturas, prácticas y seminarios siendo equivalentes a más de 100 créditos, lo cual representa un 42% del total de las asignaturas correspondientes al Plan de Estudios de la Carrera de Construcción Civil.

  3. Insolvencias. Civil y societaria

    Directory of Open Access Journals (Sweden)

    Gustavo Bordes Leone

    2014-01-01

    Full Text Available El deudor civil que, para substraerse al pago de sus obligaciones, ocultara sus bienes, simulara enajenaciones o créditos, se trasladara al extranjero o se ocultare sin dejar persona que lo represente, o bienes a la vista en cantidad suficiente para responder al pago de sus deudas, será castigado con pena de tres meses de prisión a tres años de penitenciaría. La acción penal no podrá ser ejercitada sino a denuncia de parte, y sólo en el caso de que la insolvencia del deudor resulte comprobada por actos infructuosos de ejecución en la vía civil.Antecedentes históricas. La insolvencia fraudulenta. Insolvencia societaria fraudulenta: Análisis crítico.

  4. [Viruses and civilization].

    Science.gov (United States)

    Chastel, C

    1999-01-01

    A few million years ago, when primates moved from the east African forest to the savannah, they were already infected with endogenous viruses and occultly transmitted them to the prime Homo species. However it was much later with the building of the first large cities in Mesopotamia that interhuman viral transmission began in earnest. Spreading was further enhanced with the organization of the Egyptian, Greek, Roman, and Arab empires around the Mediterranean. Discovery of the New World in 1492 led to an unprecedented clash of civilizations and the destruction of pre-Columbian Indian civilizations. It also led to a rapid spread of viruses across the Atlantic Ocean with the emergence of yellow fever and appearance of smallpox and measles throughout the world. However the greatest opportunities for worldwide viral development have been created by our present, modern civilization. This fact is illustrated by epidemic outbreaks of human immunodeficiency virus, Venezuela hemorrhagic fever, Rift valley fever virus, and monkey pox virus. Close analysis underscores the major role of human intervention in producing these events.

  5. Risicoprofielen en het opsporen van fraude bij een Wwb-uitkering

    Directory of Open Access Journals (Sweden)

    N.F. Reelick

    2010-03-01

    De laatste jaren is er binnen sociale diensten in Nederland veel aandacht geweest voor een strikt handhavingsbeleid ten aanzien van bijstandsuitkering. Het hanteren van een risicoprofiel is hierbij een veel gebruikte methode. Een risicoprofiel is opgebouwd uit factoren waarvan wordt verwacht dat zij voorspellen of een uitkeringsgerechtigde zich in zal laten met fraude. Bij Sociale Zaken en Werkgelegenheid (SoZaWe in Rotterdam is onderzoek gedaan in hoeverre gegevens die zijn opgeslagen in de bestanden van de dienst in relatie staan met fraude. Daarnaast is een onderzoek gedaan in hoeverre factoren die vanuit een theoretisch standpunt in relatie met fraude zouden kunnen staan tot een verbetering van een risicoprofiel kunnen leiden. Uit de beide onderzoeken blijkt dat de gegevens uit de bestanden van SoZaWe een geringe voorspellende waarde hebben. Deze kan iets verbeterd worden door er factoren aan toe te voegen als de attitude van de klant tegenover fraude en beoordeling van de kansen om gecontroleerd te worden en gepakt te worden voor fraude. Het gebruik van risicoprofielen, waarbij alleen van gegevens uit de bestanden van de Sociale Diensten wordt uitgegegaan moet met de grootst mogelijke terughoudendheid gebeuren.

  6. Tipos de fraudes en carnes y productos cárnicos: una revisión

    Directory of Open Access Journals (Sweden)

    T. Espinoza

    2015-01-01

    Full Text Available En años recientes la importancia del control de alimentos, en cuanto a la identificación de sus componentes para evitar fraudes, ha crecido tanto en interés en las organizaciones estatales como en las empresas y en las industrias. La globalización, el aumento de las importaciones y exportaciones, y los tratados de libre comercio han propiciado un mayor intercambio y acceso de los alimentos a nivel mundial; junto con ello los problemas asociados a los fraudes tales como la adulteración, sustitución, la intencionalidad, y falsificación se han incrementado. Por ello, se han reportado varios trabajos asociados al fraude alimentario, donde en la mayoría de ellas se muestran aplicaciones de nuevas técnicas de identificación. Sin embargo, una discusión acerca de los tipos de fraude y su impacto sobre la sociedad, el bioterrorismo y la religión, ha sido poco abordada. Esta revisión se enfoca básicamente en describir los tipos de fraude en alimentos más comunes. Así como, se mencionan las recientes técnicas disponibles para detectar una adulteración en carnes.

  7. Mekanisme Corporate Governance dan Kecurangan Laporan Keuangan [Mechanisms of Corporate Governance and Financial Statement Fraud

    Directory of Open Access Journals (Sweden)

    Fitri Ismiyanti

    2015-09-01

    Full Text Available The purpose of this research is to examine factors that may affect fraud on financial statements that could encourage the emergence of corruption by management. This research uses banks as an industry sample because the banking industry is highly regulated and should report their financial statement to a central bank. Meanwhile, banks still frequently have fraudulent financial statements. Good corporate governance mechanisms indicated that banks have the capability to detect fraud in financial statements. This research focuses on testing factors that may affect the financial statements fraud which lead to the corruption of management. The data used in this research is financial statement data. Corporate governance mechanisms tested in this study are the number of commissioners, percentage of independent directors, number of commissioners meeting, percentage of largest share ownership, managerial ownership, long tenure of commissioners, and type of auditor. This research found that the number of commissioners and managerial ownership affects management's fraud, while the number of independent directors, the number of commissioners meeting, a long tenure managing director, large share ownership, and the type of auditor has no effect on fraud.

  8. Fraud risks in emissions trading; Frauderisico's bij handel in emissierechten

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-09-15

    The system of emission trading is a complex composed entity with on the one hand a strong environmental component and on the other hand a financial world that hooked on this instrument. In chapter 2 an introduction is provided to the emission trading system. The subsequent chapters elaborate Types of Fraud (Chapter 3), Powers (Chapter 4), and Instruments (Chapter 5). The report shows that various forms of fraud are occurring in emission trading, such as VAT fraud and identity theft. [Dutch] Het systeem van emissiehandel is een complex samengesteld geheel met aan de ene kant een belangrijke milieucomponent en aan de andere kant een financiele wereld die ingehaakt heeft op dit instrument. In hoofdstuk 2 wordt een introductie gegeven op het systeem van emissiehandel. In de volgende hoofdstukken wordt dieper ingegaan op Fraudevormen (hoofdstuk 3), Bevoegdheden (hoofdstuk 4), en Instrumentarium (hoofdstuk 5). Uit het rapport blijkt dat verschillende vormen van fraude zijn optreden bij de handel in emissierechten, zoals BTW-fraude en identiteitsfraude.

  9. Development of Combination HIV Prevention Programs for People Who Inject Drugs through Government and Civil Society Collaboration in the Russian Federation

    Directory of Open Access Journals (Sweden)

    M. V. Volik

    2012-01-01

    Full Text Available Population Services International (PSI has worked collaboratively with several government institutions of the Russian Federation to develop and implement a model program to access health services for individuals who are opioid dependent, including those with HIV infection. Through the development of partnership agreements between government organizations (GOs and non-government organizations (NGOs, a model of the continuum of care has been developed that identifies a Recommended Package of HIV Prevention Services for Injecting Drug Users (RPS-IDU. The implementation of the RPS-IDU in the Russian Federation offers a model for other countries with HIV epidemics associated with injection drug use. This paper will describe the model program and its implementation in one of the pilot program regions.

  10. NASA-UVA Light Aerospace Alloy and Structures Technology Program (LA2ST). Research on Materials for the High Speed Civil Transport

    Science.gov (United States)

    Gangloff, Richard P.; Starke, Edgar A., Jr.; Kelly, Robert G.; Scully, John R.; Stoner, Glenn E.; Wert, John A.

    1997-01-01

    Since 1986, the NASA-Langley Research Center has sponsored the NASA-UVa Light Alloy and Structures Technology (LA2ST) Program at the University of Virginia (UVa). The fundamental objective of the LA2ST program is to conduct interdisciplinary graduate student research on the performance of next generation, light-weight aerospace alloys, composites and thermal gradient structures. The LA2ST program has aimed to product relevant data and basic understanding of material mechanical response, environmental/corrosion behavior, and microstructure; new monolithic and composite alloys; advanced processing methods; measurement and modeling advances; and a pool of educated graduate students for aerospace technologies. The scope of the LA2ST Program is broad. Research areas include: (1) Mechanical and Environmental Degradation Mechanisms in Advanced Light Metals and Composites, (2) Aerospace Materials Science, (3) Mechanics of materials for Aerospace Structures, and (4) Thermal Gradient Structures. A substantial series of semi-annual progress reports issued since 1987 documents the technical objectives, experimental or analytical procedures, and detailed results of graduate student research in these topical areas.

  11. FControl®: sistema inteligente inovador para detecção de fraudes em operações de comércio eletrônico FControl®: an innovative intelligent system for fraud detection in e-commerce transactions

    Directory of Open Access Journals (Sweden)

    Leandro dos Santos Coelho

    2006-04-01

    techniques in the support of service tasks such as anomaly detection and identification, pattern classification, diagnostics, prognostics, estimation and control has recently emerged in industrial and commercial environments. This paper presents an efficient system based on computational intelligence methodologies for the detection of fraud in the operation of real credit card data in E-commerce transactions. This new proposed method, called FControl® for fraud detection and classification, integrates concepts of hybrid intelligent systems based on neural networks, fuzzy systems and evolutionary computation approaches. The proposed method generates quality solutions in terms of prediction efficiency and success. The computational program of the FControl® system has been installed on an Intel Pentium IV 2.4 MHz (bi-processor and 4 Gbytes RAM at the company Ciashop E-Commerce and is currently in use for fraud detection by 250 companies that offer E-commerce services.

  12. Operational circular No.10 – Principles and procedures governing investigation of fraud

    CERN Multimedia

    2013-01-01

    Operational Circular No. 10 entitled “Principles and procedures governing investigation of Fraud”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 4 December 2012 and entering into force on 1 January 2013, is available on the intranet site of the Human Resources Department.   This circular is applicable to all persons working at or on behalf of CERN. The purpose of this new operational circular is to specify the definition of fraud and to lay down the Organization’s fraud investigation process pursuant to the CERN Anti-fraud Policy and in accordance with the principles of due process. Department Head Office HR Department

  13. A new vision of the post-NIST civil infrastructure program: the challenges of next-generation construction materials and processes

    Science.gov (United States)

    Wu, H. Felix; Wan, Yan

    2014-03-01

    , security, and safety of elements of critical infrastructure for the Nation's already deteriorating civil infrastructure. It is envisioned that the Nation should look far beyond: not only should we efficiently and effectively address current problems of the aging infrastructure, but we must also further develop next-generation construction materials and processes for new construction. To accomplish this ambitious goal, we must include process efficiency that will help select the most reliable and cost-effective materials in construction processes; performance and cost will be the prime consideration for selections construction materials based on life-cycle cost and materials performance; energy efficiency will drive reduced energy consumption from current levels by 50 % per unit of output; and environmental responsiveness will achieve net-zero waste from construction materials and its constituents. Should it be successfully implemented, we will transform the current 21st century infrastructure systems to enable the vital functioning of society and improve competitiveness of the economy to ensure that our quality of life remains high.

  14. 41 CFR 105-55.003 - Antitrust, fraud, tax, interagency claims, and claims over $100,000 excluded.

    Science.gov (United States)

    2010-07-01

    ... apply to any debt based in whole or in part on conduct in violation of the antitrust laws or to any debt... antitrust laws or any claim involving fraud, the presentation of a false claim, or misrepresentation on the... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Antitrust, fraud, tax...

  15. An Investigation of the Influence of the Worldwide Governance and Competitiveness on Accounting Fraud Cases: A Cross-Country Perspective

    Directory of Open Access Journals (Sweden)

    Rabeea Sadaf

    2018-02-01

    Full Text Available This article examines how worldwide governance, global competiveness, and other institutional determinants have influenced the number of accounting fraud cases in several countries. The researchers have focused more closely on the importance of ‘good governance’ as one of the indicators of development objectives in itself. The institutional perspective is employed to explain the complexity of frauds in different societies which can be compatible for the purposes of international judgments in order to increase the effectiveness of previous forensic accounting theories. In this paper, a linear regression model is tested where governance, competitiveness, and other institutional variables are associated with a measure of accounting fraud cases. From our results, we can merely claim that an increased level of controlled corruption and political stability might reduce the number of fraud cases in various countries, while more effective and independent governance services with a higher freedom of expression seemed to increase them. The existence of accounting crimes also appeared to be a suitable proxy of better competitiveness. Anglo-Saxon countries have more stated fraud cases than other countries, attributed, perhaps, to the finest commercial courts with the most professional and least corrupt judges in the world, with centuries of precedent cases and experience in dealing with fraud. Moreover, we believe that a better understanding of fraud detection is a potentially important element in forensic accounting analytics in the success of governance policies to enhance development and reduce the risk of bankruptcies related to the reported fraud cases of enterprises.

  16. 17 CFR 39.7 - Fraud in connection with the clearing of transactions on a derivatives clearing organization.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with the clearing of transactions on a derivatives clearing organization. 39.7 Section 39.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.7 Fraud in connection...

  17. 17 CFR 1.1 - Fraud in or in connection with transactions in foreign currency subject to the Commodity Exchange...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in or in connection with... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.1 Fraud in or in connection with transactions in foreign currency subject to the...

  18. 45 CFR 30.3 - Antitrust, fraud, exception in the account of an accountable official, and interagency claims...

    Science.gov (United States)

    2010-10-01

    ... of antitrust laws, or to any debt involving fraud, presentation of a false claim, or... violation or fraud, a false claim, misrepresentation, or other criminal activity or misconduct, the Secretary shall refer the debt to the Office of the Inspector General for review. (3) Upon the determination...

  19. Prediction of food fraud type using data from Rapid Alert System for Food and Feed (RASFF) and Bayesian network modelling

    NARCIS (Netherlands)

    Bouzembrak, Y.; Marvin, H.J.P.

    2016-01-01

    Because food fraud can harm human health and erode consumer trust, it is imperative that it is detected at an early stage. Therefore the aim of this study was to predict the expected food fraud type for imported products for which the product category and country of origin are known in order to

  20. Health Care Fraud: Characteristics, Sanctions, and Prevention. Briefing Report to the Honorable William V. Roth, Jr., U.S. Senate.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Accounting and Financial Management Div.

    At the request of Senator William Roth, Jr., the General Accounting Office (GAO) reviewed Medicare and Medicaid fraud investigations that agency inspectors general referred to the Department of Justice for prosecution to identify characteristics of alleged fraud against the government and to determine actions taken against those caught defrauding…

  1. Finding You on the Internet: an approach for finding on-line presences of people for fraud risk analysis

    NARCIS (Netherlands)

    Been, Henry; van Keulen, Maurice

    Fraud risk analysis on data from formal information sources, being a ‘paper reality', suffers from blindness to false information. Moreover, the very act of providing false information is a strong indicator for fraud. The technology presented in this paper provides one step towards the vision of

  2. Radiation Protection and Civil defence Department

    International Nuclear Information System (INIS)

    Gomaa, M.A.; Elshinawy, R.M.K.; Abdelfattah, A.T.

    1991-01-01

    This conference involves subjects of radiation protection, programming of civil defence, on the implementation of 1990 ICRP recommendation, thermoluminescence properties of bone equivalent calcium phosphate ceramics, potassium body burdens in occupational users of egyptian nuclear research centre, transport of radionuclides in fresh water stream, water treatment process for nuclear reactor, research activities related to internal contamination and bioassay and experience and environmental radiation monitoring in inshass. it contains of figures and tables

  3. Civil Division - Alaska Department of Law

    Science.gov (United States)

    Attorney General Opinions Executive Branch Ethics Criminal Justice Alaska Medicaid Fraud Control Anchorage department and other agencies on the management, retention, communication, and disclosure of information matters. In addition, the legislative liaison coordinates responses to media requests. Natural Resources

  4. Percepciones públicas del fraude electoral en México

    Directory of Open Access Journals (Sweden)

    Andreas Schedler

    1999-06-01

    Full Text Available After a long history of electoral fraud, Mexicana entered the 1990s with deep skepticism towardspolitical elections. Subsequent electoral reforma succeeded to bring fraud under control. How did Mexican citizens react to these institutional changes f Did they hibernate under theprotectivecover of un unchanging "culture ofdistrust"? Or did they adapt their expectations to thenew realities? Thearticlesupports the hypothesis ofchange. Analyzing a set of formerly disperse opinwn poli data, it arrives at an optimisticpicture: Trust in elections has steadily increased since 1988.

  5. ¿Qué es el fraude electoral? Su naturaleza, sus causas y consecuencias

    OpenAIRE

    Lehoucq, Fabrice

    2007-01-01

    La primera de las tres conclusiones de este estudio es que el fraude puede adoptar una amplia gama de formas, desde las violaciones de procedimiento a la ley electoral (con o sin la intención de alterar los resultados) hasta el abierto uso de la violencia en contra de los votantes. Segunda, aun cuando la manipulación del voto es parte integral de la competencia electoral, rara vez desempeña un papel decisivo. En todo caso, el fraude debilita la estabilidad política, ya que puede ser crucial c...

  6. Competencia política y fraude electoral en Chile, 1912-1925

    OpenAIRE

    Ponce de León Atria, Macarena

    2015-01-01

    Este artículo busca comprender las complejidades de la competencia electoral por el poder político en Chile en los inicios de su institucionalización. El fraude, sobre todo el cohecho, junto a la rotativa ministerial durante la llamada República Parlamentaria (1891-1925) han sido argumentos recurrentes en la historiografía para probar la crisis política del período. Este artículo cambia el foco sobre el parlamentarismo y el tipo de fraude, e intenta probar que, entre las diversas estrategias ...

  7. The Civil War Diet

    OpenAIRE

    Brennan, Matthew Philip

    2005-01-01

    The soldierâ s diet in the Civil War has been known as poor, and a number of illnesses and disorders have been associated with it. However, a nutritional analysis placed within the context of mid-nineteenth century American nutrition has been lacking. Such an approach makes clear the connection between illness and diet during the war for the average soldier and defines the importance of nutritionâ s role in the war. It also provides a bridge from the American diet to the soldier diet, ou...

  8. Transnationalising Civil Society?

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    The paper takes a transnational perspective on developing an analytical framework for understanding how transnationalism interacts with civil society and how immigrant organisations use transnational strategies to challenge the pre-given positions of immigrants within given integration......- and citizenship-regimes. Locating transnationalism as part of the political opportunity structure also indicates that the state(s) to some degree can facilitate transnationalism, directly and indirectly. A substantial part of political engagement now occurs via transnational channels. What is uncertain is to what...

  9. The Criminal Offense of Credit/Debit Card Fraud and the Implementation of Its Sanction on Indonesian Criminal Law

    Directory of Open Access Journals (Sweden)

    Antonius Maria Laot Kian

    2015-04-01

    Full Text Available The aims of the study are to determine the legal arrangements and the application of criminal sanctions against the crime of credit/debit card fraud in Indonesia. The type of study was a normative research by classifying the provisions relevant to the crime of credit/debit card fraud is based on Law No. 11 Year 2008 concerning Information and Electronic Transactions; otherwise it is used also Convention on Cyber crime 2001. Analysis of legal materials made through a law (statue approach to create an ius constituendum regarding the application of criminal sanctions against crime credit/debit card fraud. The results of the research indicated that the legal arrangements and criminal sanctions against the crime of credit/debit card fraud in Indonesia is still relatively minimal. First, not integrated article that directly regulates computer related fraud. Second, not arranged in the form of criminal sanctions for actions that are restitution culprit.

  10. THE EFFECT OF INDIVIDUAL MORALITY AND INTERNAL CONTROL ON THE PROPENSITY TO COMMIT FRAUD: EVIDENCE FROM LOCAL GOVERNMENTS

    Directory of Open Access Journals (Sweden)

    Novita Puspasari

    2016-05-01

    Full Text Available This paper aims to examine the influence of individual morality and internal controls on individuals’ propensity to commit accounting fraud at the local government level. This is a quasi-experimental research paper. Individual morality and internal controls are hypothesized to be having an interaction with each other in influencing the propensity to commit accounting fraud. Individuals who have low levels of moral principles are hypothesized to have the tendency to commit accounting fraud in the absence of any internal controls. To test this, a 2x2 factorial experiment was conducted involving 57 students from the Masters in Economics Development programme at Gadjah Mada University. The result shows that there is an interaction between individual morality and internal controls. The absence of internal controls does not cause an individual with high moral principles to commit accounting fraud. However, individuals with low morality levels tend to commit accounting fraud when internal controls are absent.

  11. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    specific climatic challenge or clean the air. With nanotechnology, the artificial and the natural move closer together; this is the perspective for civil engineer Chris McCarthy’s work all over the world. And what is new is not just the way the construction materials are put together; they also require......Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...

  12. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...... theme in twentieth century architecture. Together, civil engineer Peter Rice and architect Ian Ritchie created a paradigm shift with their revolutionary ideas for glass facades supported by cables. Glued and bolted constructions made entirely of glass are now a reality in small-scale projects, yet...

  13. THE INFLUENCE OF BOARD OF COMMISSIONERS AND AUDIT COMMITTEE EFFECTIVENESS, OWNERSHIP STRUCTURE, BANK MONITORING, AND FIRM LIFE CYCLE ON ACCOUNTING FRAUD

    OpenAIRE

    Synthia Madya Kusumawati; Ancella A. Hermawan

    2013-01-01

    Financial statement fraud has cost market participants, including investors, employees, creditors, and pensioners. Capital market participants expect active and vigilant corporate governance to ensure the quality, integrity, and transparency of financial information. Financial statement fraud is a serious threat to market participants’ confidence in published audited financial statements. Financial statement fraud has recently received considerable attention from the business community, accou...

  14. 17 CFR 31.3 - Fraud in connection with certain transactions in silver or gold bullion or bulk coins, or other...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Fraud in connection with... Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.3 Fraud... fraud or deceit upon any person, in, or in connection with (1) an offer to make or the making of, any...

  15. 41 CFR 102-38.50 - What must we do when an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or...

    Science.gov (United States)

    2010-07-01

    ... executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in connection... an executive agency suspects violations of 40 U.S.C. 559, fraud, bribery, or criminal collusion in.... 559, fraud, bribery, or criminal collusion in connection with the disposal of personal property, the...

  16. How persistent is civilization growth?

    OpenAIRE

    Garrett, Timothy J.

    2011-01-01

    In a recent study (Garrett, 2011), I described theoretical arguments and empirical evidence showing how civilization evolution might be considered from a purely physical basis. One implication is that civilization exhibits the property of persistence in its growth. Here, this argument is elaborated further, and specific near-term forecasts are provided for key economic variables and anthropogenic CO2 emission rates at global scales. Absent some external shock, civilization wealth, energy cons...

  17. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  18. Kingdom, church and civil society: A theological paradigm for civil ...

    African Journals Online (AJOL)

    This article deals with the role that churches can and should play in civil society to develop societal morally. The central-theoretical argument is that the biblical notion of the kingdom of God can, when it is systematically and theologically developed, offer an acceptable foundation for the civil action of churches. In light of this ...

  19. 21 CFR 1404.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Civil judgment. 1404.920 Section 1404.920 Food and...) Definitions § 1404.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  20. 22 CFR 208.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil judgment. 208.920 Section 208.920 Foreign...) Definitions § 208.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  1. 34 CFR 85.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Civil judgment. 85.920 Section 85.920 Education Office...) Definitions § 85.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  2. 28 CFR 31.202 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 31.202 Section 31.202....202 Civil rights. (a) To carry out the State's Federal civil rights responsibilities the plan must: (1) Designate a civil rights contact person who has lead responsibility in insuring that all applicable civil...

  3. 2 CFR 180.915 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Civil judgment. 180.915 Section 180.915... § 180.915 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  4. 22 CFR 1006.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1006.920 Section 1006.920...) Definitions § 1006.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  5. 22 CFR 1508.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1508.920 Section 1508.920...) Definitions § 1508.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  6. Use of molecular biology techniques in the detection of fraud meat in ...

    African Journals Online (AJOL)

    Microsoft

    2015-02-04

    Feb 4, 2015 ... respect to economic and sanitary issues. ... products with Tsp509I and AluI restriction enzymes. .... specific PCR assay was found to be rapid and cost ... produced specific fragments of about 195 bp for ruminant ... industries. ... Fraud identification in industrial meat ... Application of an indirect ELISA and a.

  7. A fraud prevention policy: Its relevance and implication at a university of technology in South Africa

    Directory of Open Access Journals (Sweden)

    Amelia Rorwana

    2015-08-01

    Full Text Available Using research grants administrators and their clients (academic researchers as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. The results indicate that both research grants administrators (71.4 %, and their clients (73% do not know if UoTx has a fraud and irregularity policy. While only 36% of research grants administrators indicated that they would feel safe reporting deceitful activities, a slight majority (59% of the clients reported same. With regards to the steps to follow to report fraudulent activity, it was noted that while all (100% the research grants administrators noted that they were clueless, ironically an overwhelming majority of their clients indicated otherwise. Notwithstanding, both research grants administrators and their clients (93% and 95% respectively concurred that a fraud prevention policy was necessary for UoTx. The implication is that having phenomenal controls that are not effectively publicized, monitored or worse still overridden by someone are useless.

  8. Implications of Fraud and Error Risks in the Enterprise Environment and Auditor’s Work

    Directory of Open Access Journals (Sweden)

    Emil Horomnea

    2012-05-01

    Full Text Available The objective of this study is to identify and analyze the main correlations and implications offraud and error in the business environment and in the financial scandals occurred in the last decade. Theapproach envisages a synthesis and antithesis of the ideas found on this subject in the specialty literature, ofthe regulations issued by various international bodies. To achieve the established objectives, we used aconstructive methodology to identify criticism, presentations and developed a speech with view to a moreefficient and effective fraud and error risk management. The results of the study show that the major financialscandals and hence the global economic crisis are based largely on fraudulent maneuvers of significantproportions. By using "creative accounting" in fraud and error, famous companies have managed to distortreality for their performance and market position, misleading the users’ perception. This study is a theoreticalhaving implications for a future empirical study.The study contributes to auditing literature diversification inthe field of risk of fraud and error. An additional perspective is gained by addressing the financial crisis andsome famous bankruptcies by way of the financial auditors activity and the fraud and error risk.

  9. Uncovering Document Fraud in Maritime Freight Transport Based on Probabilistic Classification

    NARCIS (Netherlands)

    Triepels, Ron; Feelders, A.J.; Daniels, Hennie

    2015-01-01

    Deficient visibility in global supply chains causes significant risks for the customs brokerage practices of freight forwarders. One of the risks that freight forwarders face is that shipping documentation might contain document fraud and is used to declare a shipment. Traditional risk controls are

  10. The evaluation of trustworthiness to identify health insurance fraud in dentistry.

    Science.gov (United States)

    Wang, Shu-Li; Pai, Hao-Ting; Wu, Mei-Fang; Wu, Fan; Li, Chen-Lin

    2017-01-01

    According to the investigations of the U.S. Government Accountability Office (GAO), health insurance fraud has caused an enormous pecuniary loss in the U.S. In Taiwan, in dentistry the problem is getting worse if dentists (authorized entities) file fraudulent claims. Several methods have been developed to solve health insurance fraud; however, these methods are like a rule-based mechanism. Without exploring the behavior patterns, these methods are time-consuming and ineffective; in addition, they are inadequate for managing the fraudulent dentists. Based on social network theory, we develop an evaluation approach to solve the problem of cross-dentist fraud. The trustworthiness score of a dentist is calculated based upon the amount and type of dental operations performed on the same patient and the same tooth by that dentist and other dentists. The simulation provides the following evidence. (1) This specific type of fraud can be identified effectively using our evaluation approach. (2) A retrospective study for the claims is also performed. (3) The proposed method is effective in identifying the fraudulent dentists. We provide a new direction for investigating the genuineness of claims data. If the insurer can detect fraudulent dentists using the traditional method and the proposed method simultaneously, the detection will be more transparent and ultimately reduce the losses caused by fraudulent claims. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. IT-Driven Approaches to Fraud Detection and Control in Financial ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-09-01

    Sep 1, 2013 ... processes. Fraud is a million dollar business that ... unexpected risks and proactively respond to such [9]. ... task using normal audit procedures [13]. Firstly ... model that emulates a biological system. .... stimulate human decision-making ... Transport Planning", International Journal on Soft Computing (IJSC),.

  12. The 419 codes as business unusual: the advance fee fraud online ...

    African Journals Online (AJOL)

    The 419 codes as business unusual: the advance fee fraud online discourse. A Adogame. Abstract. No Abstract. International Journal of Humanistic Studies Vol. 5 2006: pp. 54-72. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners ...

  13. Red flags in detecting credit cooperative fraud: the perceptions of internal auditors

    Directory of Open Access Journals (Sweden)

    Cristian Baú Dal Magro

    2017-07-01

    Full Text Available Purpose – Red flags are mechanisms that can be used by internal auditors for early detection of possible fraud. In this context, the aim of this study was to identify the relevance credit unions’ internal auditors attribute to red flags in assessing fraud risk. Design/methodology/approach – This article is characterized as descriptive concerning its goals, as a survey as to is procedures, and as quantitative in reference to its approach to the problem. The sample onsists of 51 internal auditors working in Credit Union Centers in southern Brazil. Findings – Results indicate that, in the assessment of fraud risk, internal auditors attribute greater importance to red flags referring to operational activities and internal control procedures. In addition, it is suggested that internal auditors are not impartial concerning their perception of relevance of most of the warning signs of the possibility of fraud. Originality/value – The findings contribute by demonstrating to internal auditors the need for greater attention to the use of red flags as auditing tools.

  14. Perceptions of Biometric Experts on Whether or Not Biometric Modalities Will Combat Identity Fraud

    Science.gov (United States)

    Edo, Galaxy Samson

    2012-01-01

    Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…

  15. Force, fraud, and coercion : Bridging from knowledge of intercountry adoption to global surrogacy

    NARCIS (Netherlands)

    K. Smith Rotabi (Karen); K.E. Cheney (Kristen)

    2014-01-01

    textabstractThis report discusses concerns raised by participants of Thematic Area 4 (Force, Fraud and Coercion) of the International Forum on Intercountry Adoption and Global Surrogacy held in August 2014. There has been a significant body of research on intercountry adoption practices over the

  16. IT-Driven Approaches to Fraud Detection and Control in Financial ...

    African Journals Online (AJOL)

    ... case-based Reasoning, genetic algorithm and fuzzy logic. Its derivable benefits were x-rayed. It has been concluded that there is need for an IT-driven approach to fraud detection and control as a workable alternative to curb the increase and sophistication of fraudsters. KEYWORD: Data Mining, Artificial Neural Network, ...

  17. After Halliburton: Event Studies and Their Role in Federal Securities Fraud Litigation

    NARCIS (Netherlands)

    J.E. Fisch (Jill); J.B. Gelbach (Jonah); J.M. Klick (Jonathan)

    2016-01-01

    markdownabstractEvent studies have become increasingly important in securities fraud litigation after the Supreme Court’s decision in Halliburton II. Litigants have used event study methodology, which empirically analyzes the relationship between the disclosure of corporate information and the

  18. 29 CFR 2580.412-9 - Meaning of fraud or dishonesty.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Meaning of fraud or dishonesty. 2580.412-9 Section 2580.412-9 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  19. 7 CFR 1773.9 - Disclosure of fraud, illegal acts, and other noncompliance.

    Science.gov (United States)

    2010-01-01

    ..., the auditor must design the audit to provide reasonable assurance of detecting fraud that is material... UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE (CONTINUED) POLICY ON AUDITS OF RUS BORROWERS RUS Audit... statements, auditors should apply audit procedures specifically directed to ascertaining whether an illegal...

  20. Text mining to detect indications of fraud in annual reports worldwide

    NARCIS (Netherlands)

    Fissette, Marcia Valentine Maria

    2017-01-01

    The research described in this thesis examined the contribution of text analysis to detecting indications of fraud in the annual reports of companies worldwide. A total of 1,727 annual reports have been collected, of which 402 are of the years and companies in which fraudulent activities took place,

  1. Uncovering document fraud in maritime freight transport based on probabilistic classification

    NARCIS (Netherlands)

    Triepels, Ron; Feelders, A. F.; Daniels, Hennie

    2015-01-01

    Deficient visibility in global supply chains causes significant risks for the customs brokerage practices of freight forwarders. One of the risks that freight forwarders face is that shipping documentation might contain document fraud and is used to declare a shipment. Traditional risk controls are

  2. Increasing the detection of minority class instances in financial statement fraud

    CSIR Research Space (South Africa)

    Moepya, Stephen

    2017-04-01

    Full Text Available -1 Asian Conference on Intelligent Information and Database Systems, 3-5 April 2017, Kanazawa, Japan Increasing the detection of minority class instances in financial statement fraud Stephen Obakeng Moepya1,2(B), Fulufhelo V. Nelwamondo1...

  3. Detection of Fraud with Agent–Based Models: the 2006 Mexican Election

    Directory of Open Access Journals (Sweden)

    Gonzalo Castañeda

    2010-07-01

    Full Text Available In this paper an innovative tool is applied for the detection of electoral fraud by analyzing statistical distributions of the official results. With this aim a computational model is developed to describe the dynamics of an electoral campaign that conditions the individuals' political preferences. The agent–based model is built assuming that in a clean process the electoral outcome depends, essentially, on preferences subjected to the influence of social interaction and global information. In contrast, in order to simulate an electoral fraud the model is modified such that the voting behavior of the citizens is manipulated on election–day. The model is calibrated with data form the 2006 Mexican electoral campaign for the presidency, and the presence or absence of fraud is validated using the Kolmogorov–Smirnov test, a non–parametric procedure. With information aggregated at the electoral district level, the simulation model rejects the existence of a large scale fraud where at least 5–6% of the total vote tally is manipulated in favor of a particular candidate.

  4. Use of forensic accounting techniques in the detection of fraud in ...

    African Journals Online (AJOL)

    This study investigated the extent of use of forensic accounting techniques in the detection of fraud in tertiary institutions in Anambra State, Nigeria. One research question guided the study and one null hypothesis was tested. Related literature pertinent to the study was reviewed which exposed the need for the study.

  5. Growth of electoral fraud in non-democracies: the role of uncertainty

    Czech Academy of Sciences Publication Activity Database

    Vorobyev, Dmitriy

    -, č. 420 (2010), s. 1-40 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Grant - others:MŠk(CZ) SVV-2010-261801 Institutional research plan: CEZ:MSM0021620846 Keywords : election * voting * fraud * learning Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp420.pdf

  6. The paradox of civilizing

    DEFF Research Database (Denmark)

    Gilliam, Laura

    As in most other European Countries, immigrants from “non-Western” countries are increasingly perceived as a threat to integration, equality and harmony in Danish society. Especially the immigrant boys are depicted as aggressive, troublesome and in lack of social competencies. This makes this group...... minority youngsters, which are seen as a threat to the stability and harmony of Danish society. Based on ethnographic material from 11 months of fieldwork among ethnic minority pupils in two schools in Copenhagen, this paper will look into the schools’ effort to civilize youth of outsider status. Through....... For their part, the boys - in search of alternative strength and recognition - invert the image of good behavior presented to them by the school, and come to identify strongly with aggression, rude language and tough masculinity. Drawing on Elias’ discussions of dominant group’s efforts to both integrate...

  7. Departamento de Obras Civiles

    OpenAIRE

    Director Departamento de Obras Civiles

    1984-01-01

    Es la unidad académica que se crea como estructura básica para la formación profesional del Constructor Civil. El departamento está orientado a las siguientes áreas: Obras Viales, Fluviales y Marítimas; Hormigones y Mecánica de Suelos; Laboratorios y Control de Calidad; Planificación y Programación; Administración; Organización y Gestión Financiera, conocimientos insertos en un total de 33 asignaturas, prácticas y seminarios siendo equivalentes a más de 100 créditos, lo cual representa un 42%...

  8. Food fraud and the perceived integrity of European food imports into China

    Science.gov (United States)

    Raley, M.; Dean, M.; Clark, B.; Stolz, H.; Home, R.; Chan, M. Y.; Zhong, Q.; Brereton, P.; Frewer, L. J.

    2018-01-01

    Background/Aims Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. Methods A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase “authentic” European products using structural equation modelling. Results Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed ‘risk-relieving’ strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Conclusions Targeted communication of authenticity assurance measures, including; regulations

  9. Food fraud and the perceived integrity of European food imports into China.

    Science.gov (United States)

    Kendall, H; Naughton, P; Kuznesof, S; Raley, M; Dean, M; Clark, B; Stolz, H; Home, R; Chan, M Y; Zhong, Q; Brereton, P; Frewer, L J

    2018-01-01

    Persistent incidents of food fraud in China have resulted in low levels of consumer trust in the authenticity and safety of food that is domestically produced. We examined the relationship between the concerns of Chinese consumers regarding food fraud, and the role that demonstrating authenticity may play in relieving those concerns. A two-stage mixed method design research design was adopted. First, qualitative research (focus groups n = 7) was conducted in three Chinese cities, Beijing, Guangzhou and Chengdu to explore concerns held by Chinese consumers in relation to food fraud. A subsequent quantitative survey (n = 850) tested hypotheses derived from the qualitative research and theoretical literature regarding the relationship between attitudinal measures (including risk perceptions, social trust, and perceptions of benefit associated with demonstrating authenticity), and behavioral intention to purchase "authentic" European products using structural equation modelling. Chinese consumers perceive food fraud to be a hazard that represents a food safety risk. Food hazard concern was identified to be geographically influenced. Consumers in Chengdu (tier 2 city) possessed higher levels of hazard concern compared to consumers in Beijing and Guangzhou (tier 1). Structural trust (i.e. trust in actors and the governance of the food supply chain) was not a significant predictor of attitude and intention to purchase authenticated food products. Consumers were shown to have developed 'risk-relieving' strategies to compensate for the lack of trust in Chinese food and the dissonance experienced as a consequence of food fraud. Indexical and iconic authenticity cues provided by food manufacturers and regulators were important elements of product evaluations, although geographical differences in their perceived importance were observed. Targeted communication of authenticity assurance measures, including; regulations; enforcement; product testing; and actions taken by

  10. Journal of Civil Engineering, JKUAT

    African Journals Online (AJOL)

    The Journal of Civil Engineering, JKUAT aims to publish definitive and original research papers of high standard, containing material of broad interest and of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems. It provides a forum for ...

  11. Civil works for NPPs construction

    International Nuclear Information System (INIS)

    Portenseigne, Christophe

    2014-01-01

    Christophe Portenseigne, Technical Director of Bouygues Travaux Publics, provided explanations on the main challenges of Civil work for the construction of the 3. generation of NPPs. He then provided an overview of the new Civil Work concepts for the 4. generation of NPPs

  12. Environmental Ethics and Civil Engineering.

    Science.gov (United States)

    Vesilind, P. Aarne

    1987-01-01

    Traces the development of the civil engineering code of ethics. Points out that the code does have an enforceable provision that addresses the engineer's responsibility toward the environment. Suggests revisions to the code to accommodate the environmental impacts of civil engineering. (TW)

  13. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  14. Policing plutonium: the civil liberties fallout

    International Nuclear Information System (INIS)

    Ayres, R.W.

    1975-01-01

    The most significant social cost of plutonium may be the legal problem of adjusting public safety with individual civil liberties. Safeguards to keep plutonium from criminals and terrorists will require a sacrifice of personal liberties and basic changes in the legal framework. Individuals will be denied many of the rights of privacy, expression, and association they have taken for granted. There will be a division between people associated with the nuclear industry and those outside it. Protective measures could result in a general feeling of suspicion, persecution, and distrust. If an incident should occur, the public would be caught between the perpetrators and the government, with search and seizure conditions similar to a civil war. Significant reduction of energy consumption should be imposed and all other sources of energy fully exploited or proven unworkable before undertaking a program with such consequences

  15. Considerations in civil commitment of individuals with substance use disorders.

    Science.gov (United States)

    Cavaiola, Alan A; Dolan, David

    2016-01-01

    Several states currently have enacted laws that allow for civil commitment for individuals diagnosed with severe substance use disorders. Civil commitment or involuntary commitment refers to the legal process by which individuals with mental illness are court-ordered into inpatient and/or outpatient treatment programs. Although initially civil commitment laws were intended for individuals with severe mental illness, these statutes have been extended to cover individuals with severe substance use disorders. Much of the recent legislation allowing for civil commitment of individuals with substance use disorders has come about in response to the heroin epidemic and is designed to provide an alternative to the unrelenting progression of opioid use disorders. Civil commitment also provides an opportunity for individuals with opioid use disorders to make informed decisions regarding ongoing or continued treatment. However, civil commitment also raises concerns regarding the potential violation of 14th Amendment rights, specifically pertaining to abuses of deprivation of liberty or freedom, which are guaranteed under the 14th Amendment to the United States Constitution. This commentary examines these issues while supporting the need for effective brief civil commitment legislation in all states.

  16. Sustainability issues in civil engineering

    CERN Document Server

    Saride, Sireesh; Basha, B

    2017-01-01

    This compilation on sustainability issues in civil engineering comprises contributions from international experts who have been working in the area of sustainability in civil engineering. Many of the contributions have been presented as keynote lectures at the International Conference on Sustainable Civil Infrastructure (ICSCI) held in Hyderabad, India. The book has been divided into core themes of Sustainable Transportation Systems, Sustainable Geosystems, Sustainable Environmental and Water Resources and Sustainable Structural Systems. Use of sustainability principles in engineering has become an important component of the process of design and in this context, design and analysis approaches in civil engineering are being reexamined to incorporate the principles of sustainable designs and construction in practice. Developing economies are on the threshold of rapid infrastructure growth and there is a need to compile the developments in various branches of civil engineering and highlight the issues. It is th...

  17. A holistic approach to food safety risks: Food fraud as an example.

    Science.gov (United States)

    Marvin, Hans J P; Bouzembrak, Yamine; Janssen, Esmée M; van der Fels-Klerx, H J; van Asselt, Esther D; Kleter, Gijs A

    2016-11-01

    Production of sufficient, safe and nutritious food is a global challenge faced by the actors operating in the food production chain. The performance of food-producing systems from farm to fork is directly and indirectly influenced by major changes in, for example, climate, demographics, and the economy. Many of these major trends will also drive the development of food safety risks and thus will have an effect on human health, local societies and economies. It is advocated that a holistic or system approach taking into account the influence of multiple "drivers" on food safety is followed to predict the increased likelihood of occurrence of safety incidents so as to be better prepared to prevent, mitigate and manage associated risks. The value of using a Bayesian Network (BN) modelling approach for this purpose is demonstrated in this paper using food fraud as an example. Possible links between food fraud cases retrieved from the RASFF (EU) and EMA (USA) databases and features of these cases provided by both the records themselves and additional data obtained from other sources are demonstrated. The BN model was developed from 1393 food fraud cases and 15 different data sources. With this model applied to these collected data on food fraud cases, the product categories that thus showed the highest probabilities of being fraudulent were "fish and seafood" (20.6%), "meat" (13.4%) and "fruits and vegetables" (10.4%). Features of the country of origin appeared to be important factors in identifying the possible hazards associated with a product. The model had a predictive accuracy of 91.5% for the fraud type and demonstrates how expert knowledge and data can be combined within a model to assist risk managers to better understand the factors and their interrelationships. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Lineage of global civil engineering. Global civil engineering no keifu

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, M

    1994-04-15

    This paper considers which way the global civil engineering should go in the future. Civil engineering has now a paradigm with a new dimension debuted as the global environmental problems are taken up specifically. Achieving the target of civil engineering requires a critical review that how the cost effect and efficiency discussions in only the dimensions of the conventional technologies and economies can be incorporated into the dimensions and measures of new fields to create the new horizons. Conceiving the relationship between civil engineered structures and environmental climate encounters the indispensable judgment criterion on how such social scientific conditions as weather, culture, religion, economy, and politics are combined to reach a judgment. The global civil engineering is desired to have the ideas and directional role to work on the ultimate assignment of environment and development called a global environmental problem analytically, comprehensively, innovatively and creatively as the civil engineering science, rather than as a mere existence of one area of the advanced civil engineering science. 5 refs., 1 tab.

  19. Finding You on the Internet: an approach for finding on-line presences of people for fraud risk analysis

    OpenAIRE

    Been, Henry; van Keulen, Maurice

    2014-01-01

    Fraud risk analysis on data from formal information sources, being a ‘paper reality', suffers from blindness to false information. Moreover, the very act of providing false information is a strong indicator for fraud. The technology presented in this paper provides one step towards the vision of harnessing real-world data from social media and internet for fraud risk analysis. We introduce a novel iterative search, monitor, and match approach for finding on-line presences of people. A real-wo...

  20. Establishing Proactive Auditor Responsibilities in Relation to Fraud: The Role of the Courts and Professional Bodies in Denmark

    DEFF Research Database (Denmark)

    Holm, Claus; Langsted, Lars Bo; Seehausen, Jesper

    2012-01-01

    Over the years, there has been considerable discussion about the extent and exact nature of the responsibilities of the auditor to detect fraud. The purpose of our study is to examine how the courts and professional bodies in a principle-based legal system respond to the change in the audit...... promulgations introducing proactive responsibilities in relation to fraud. We observe the outcome of actual fraud cases in which the court system and professional bodies in Denmark establish the responsibilities of auditors. The data set includes all publicized cases in the period 1996–2006. We find...

  1. El fraude fiscal en España. Una estimación con datos de contabilidad nacional

    OpenAIRE

    Pulido Alba, Emilio José

    2014-01-01

    [ES]Análisis del fraude fiscal en España atendiendo a tres pilares fundamentales: analizar las causas, proponer soluciones y cuantificar su magnitud. Todo el estudio culmina con el núcleo de la tesis cuyo objetivo es ofrecer una magnitud del fraude fiscal en los dos impuestos que más aportan a los ingresos tributarios, el IVA y el IRPF. Pretendemos ofrecer un índice de fraude fiscal lo más real posible para cada uno de estos dos impuestos y, para ello, la metodología a utilizar se basa en...

  2. Civil liberties and nuclear terrorism

    International Nuclear Information System (INIS)

    Goldberg, S.

    1987-01-01

    The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type

  3. Material civilization: things and society.

    Science.gov (United States)

    Dant, Tim

    2006-06-01

    This paper argues that although classical sociology has largely overlooked the importance of social relations with the material world in shaping the form of society, Braudel's concept of 'material civilization' is a useful way to begin to understand the sociological significance of this relationship. The limitations of Braudel's historical and general concept can be partially overcome with Elias's analysis of the connection between 'technization' and 'civilization' that allows for both a civilizing and a de-civilizing impact of emergent forms of material relation that both lengthen and shorten the chains of interdependence between the members of a society. It is suggested that the concept of the 'morality of things' employed by a number of commentators is useful in summarizing the civilizing effects of material objects and addressing their sociological significance. From the sociology of consumption the idea of materiality as a sign of social relationships can be drawn, and from the sociology of technology the idea of socio-technical systems and actor-networks can contribute to the understanding of material civilization. It is argued that the concept of 'material capital' can usefully summarize the variable social value of objects but to understand the complexity of material civilization as it unfolds in everyday life, an analysis of 'material interaction' is needed. Finally the paper suggests some initial themes and issues apparent in contemporary society that the sociological study of material civilization might address; the increased volume, functional complexity and material specificity of objects and the increased social complexity, autonomy and substitutability that is entailed. A theory of 'material civilization' is the first step in establishing a sociology of objects.

  4. Les comportements vis-à-vis de la fraude fiscale et de la fraude sociale diffèrent-ils ? Une expérience menée en Belgique, en France et aux Pays-Bas

    OpenAIRE

    Pestieau, Pierre; Lefebvre, Mathieu; Riedl, Arno; Villeval, Marie Claire

    2013-01-01

    En période de crise économique, les besoins de l’État augmentent et l’assiette fiscale se réduit. Il est alors courant de voir resurgir dans le débat public la lutte contre les diverses formes de fraude qui réduisent les recettes publiques. Dans ce contexte, on oppose régulièrement fraude fiscale à fraude sociale et la discussion porte souvent sur l’importance relative de l’une et de l’autre. On entend par fraude fiscale le détournement illégal d’un système fiscal afin de ne pas ...

  5. Fraude douanière. Réflexion à travers le cas du District d’Abidjan/Customs fraud. Consideration based on the Abidjan District case

    Directory of Open Access Journals (Sweden)

    Bamba Ladji

    2017-04-01

    Full Text Available Cet article soutient la thèse selon laquelle l’apparition de la fraude douanière à Abidjan est générée par des opérateurs économiques véreux. Ce qui est à la base d’insécurité économique, politique et sociale au sein de jeune État comme la Côte D’Ivoire. Les douanes sont chargées d’appliquer du fait de leur présence aux frontières, de leur implication dans les opérations d’importation et d’exportation, de dédouanement, les normes techniques et les droits de protection intellectuelle. Les douanes gèrent les mouvements de fond et la législation des médicaments, etc. Elles assument des missions de surveillance qu’elles assurent sur l’ensemble du territoire (les marchandises dangereuses pour la santé, la sécurité ou la moralité publique, les marchandises contrefaites, les marchandises prohibées au titre d’engagements internationaux, les marchandises faisant l’objet de courants de fraude internationale. Certaines des marchandises dites sensibles relèvent de la catégorie des marchandises fortement taxées à l’entrée (article 7 désignées par arrêté du ministre de l’Économie et des Finances comme étant celles pour lesquelles l’ensemble des droits de douane, prélèvements et taxes diverses applicables à l’importation représente plus de 20 % de leur valeur, ou de la catégorie des marchandises prohibées (article 38. Ainsi cet article a pour objectif de décrire la fraude douanière telle qu’elle s’effectue présentement à Abidjan. Nous allons montrer le fait que les fraudeurs s’adaptent aux structures en place, il est donc intéressant de comprendre le modus operandi des fraudeurs et leurs stratégies d’adaptation. This article supports the argument that the appearance of customs fraud in Abidjan is generated by unethical traders. What is the basis of economic insecurity, and social policy in the young state like Côte d’Ivoire? Customs are responsible for enforcing the fact

  6. Julgamentos parciais no processo civil

    OpenAIRE

    Antonio Carlos Nachif Correia Filho

    2015-01-01

    Este trabalho trata fundamentalmente da admissibilidade dos julgamentos parciais do mérito e de questões de mérito no sistema processual civil brasileiro, considerando especialmente o modelo constitucional de processo civil, bem como no sistema processual prospectivo previsto no Projeto de Novo Código de Processo Civil, que deve entrar vigor em breve. Com este objetivo, será abordado no início da dissertação o dogma da unidade estrutural da sentença, sua origem, fundamentos e aplicabilidade n...

  7. Civil liability on nuclear activities; Responsabilidade civil nas atividades nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Bittar, C A

    1983-12-31

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs.

  8. Plenty of frauds. Increase of delinquency or better customs controls?; Fraudes en stock. Accroissement de la delinquance ou meilleurs controles douaniers?

    Energy Technology Data Exchange (ETDEWEB)

    D` Erceville, H

    1998-12-31

    In 1995, the French taxation authorities have identified 1849 violations of law concerning the petroleum products, which correspond to a 53% increase with respect to 1994. The discovery of these frauds has permitted the recovery of 85 millions of French Francs (MFF) of taxes and rights, from which 61.1 MFF correspond to the internal tax on petroleum products (TIPP). In France, the TIPP represents 65% of the customs receipts and about 10% of the gross fiscal receipt of the general budget of the nation. Such delinquency actions can exist at any step of the petroleum file from the production to the storage of petroleum products. (J.S.).

  9. THE EFFECTIVENESS OF FRAUD TRIANGLE ON DETECTING FRAUDULENT FINANCIAL STATEMENT: USING BENEISH MODEL AND THE CASE OF SPECIAL COMPANIES

    Directory of Open Access Journals (Sweden)

    Aprillia Aprillia

    2015-12-01

    Full Text Available Fraudulent financial statement is a serious problem and to be a threat to stakeholders, especially for investor. The thing is happened because there is illegal action done intentionally, such as disclosing financial information that doesn’t match with the real condition. The purpose of this research is to acquire a effectiveness of empirical proof of fraud triangle consisting of Pressure, Opportunity, and Rationalization in detecting financial statement fraud that are indicated by using Beneish Model. The sample of this research consists of 39 companies are indicated doing fraud and 57 companies aren’t indicated doing fraud listing at BEI (Bursa Efek Indonesia in 2012 – 2014. Test of this research uses logistic regression method. Based on the result and conclusion, this research shows that opportunity (independent commissioner ownership has significant effect to fraudulent financial statement while pressure (AGROW, financial target (ROA, and rationalization (Total accrual don’t have significant effect to fraudulent financial statement.

  10. PERAN E-PROCUREMENT TERHADAP PENCEGAHAN FRAUD PADA PENGADAAN BARANG/JASA PEMERINTAH DAERAH DI PULAU LOMBOK

    Directory of Open Access Journals (Sweden)

    Luh Putu Resti Mega Artantri

    2016-06-01

    Full Text Available Penelitian ini bertujuan untuk mengetahui peran e-procurement terhadap pencegahan fraud pada pengadaan barang/jasa pemerintah daerah di pulau Lombok. Kelompok responden merupakan seluruh anggota kelompok kerja Unit Layanan Pengadaan (ULP dan anggota Layanan Pengadaan Secara Elektronik (LPSE yang berjumlah 108 orang. Penelitian ini dianalisis menggunakan model struktural dengan pendekatan Partial Least Squares (PLS. Hasil penelitian ini mengungkapkan bahwa e-procurement memiliki peran untuk menekan fraud pada pengadaan barang/jasa pemerintah daerah di Pulau Lombok. E-procurement mampu meningkatkan transparansi dan akuntabilitas pada pengadaan barang/jasa sehingga celah kecurangan dapat dikurangi. Implikasi penelitian ini dapat menegaskan peran penting e-procurement sebagai inovasi dalam pengadaan barang/jasa dalam upaya untuk mencegah fraud pada pengadaan barang/jasa. Koordinasi lintas sektoral antara pemerintah daerah dengan aparat penegak hukum diperlukan untuk mendukung peran e-procurement dalam upaya pencegahan fraud pada pengadaan barang/jasa.

  11. Radiation protection in civil defence

    International Nuclear Information System (INIS)

    Ahlborn, K.

    The brochure contains the information given to the participants of an advanced training course in civil defence, on the subject of radiation protection. The course was held by teachers of Bundesverband fuer den Selbstschutz (BVS). (orig.) [de

  12. Teaching Mathematics to Civil Engineers

    Science.gov (United States)

    Sharp, J. J.; Moore, E.

    1977-01-01

    This paper outlines a technique for teaching a rigorous course in calculus and differential equations which stresses applicability of the mathematics to problems in civil engineering. The method involves integration of subject matter and team teaching. (SD)

  13. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  14. Algeria: An Uncivilized Civil War

    National Research Council Canada - National Science Library

    Robling, Terry

    1995-01-01

    .... Moderates on both sides are seeking peace from the undeclared civil war that resulted when the military-backed regime canceled elections that Islamic fundamentalists were certain to win in 1992...

  15. Task performance fraud risk assessment on forensic accountant and auditor knowledge and mindset in Nigerian public sector

    Directory of Open Access Journals (Sweden)

    Oluwatoyin Muse Johnson Popoola

    2014-10-01

    Full Text Available This paper discusses task performance fraud risk assessment and forensic accountant and auditor knowledge and mindset in the Nigerian public sector. The aim of the study is to examine the fraud risk assessment in the Nigerian public sector through the efficient utilisation of forensic accountant and auditor knowledge and mindset. The effect will enhance the corporate governance and accountability practices among public sector accountants and auditors in Nigeria

  16. High technology and civil rights

    International Nuclear Information System (INIS)

    Lerche, P.

    1982-01-01

    Court decision reflect the widely felt lack of clarity about the present legal situation in the field of high technology. This confusion is also due to the fact that this legal situation is surrounded by civil rights constellations, which have more and more eroded the contours of our legal system in recent years: Today, civil rights are no longer specific, well-definable bulwarks for the citizen, but are more and more frequently interpreted by the supreme courts as sources of procedural requirements with more or less certain often vague consequences. This shifting of the accent in civil rights towards procedural matters is due to an innate logical necessity, however: The same civil right considered in the same situation, e.g., in planning for high technology, may give rise to very different, even contradictory individual claims. Therefore, one of the main modern objectives of civil rights becoming more and more apparent is the need to reconcile conflicting positions, which makes civil rights a driving force in balancing interests in the easiest possible way. Yet, one of the main deficiencies in this rapidly growing procedural approach is the one-sidedness often to be found as a result of isolated, punctual actions. This misses the objective of achieving adequate harmonization. As examples of such one-sided, isolated civil rights approaches, legal opinions are cited on the so-called public participation (possibility to object for those concerned) in the licensing procedures under the German Atomic Energy Act and for protection against environmental impacts. Quity rightly, this participation of the public is interpreted as an advance protection of civil rights. However, its consequences quite often are exaggerated. (orig.) [de

  17. Civil liability on nuclear activities

    International Nuclear Information System (INIS)

    Bittar, C.A.

    1982-01-01

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs

  18. On making radio contact with extraterrestrial civilizations

    International Nuclear Information System (INIS)

    Bates, D.R.

    1978-01-01

    The problem of attempting to make radio contact with other technological civilizations is examined. It is argued that there are few (perhaps indeed no) omnidirectional radio beacons in the Galaxy primarily because any such beacon, to be effective, would have to be designed for a call-response time of at least some 10 4 years, which is much too long to be likely to be acceptable to governments. A consequence is that any search program by us would have little chance of detecting incoming signals. (Auth.)

  19. PENCEGAHAN PRAKTIK KEJAHATAN EKONOMI DALAM PERDAGANGAN BEBAS – ORIGIN FRAUD DALAM INDUSTRI MEBEL KAYU DI JEPARA

    Directory of Open Access Journals (Sweden)

    Tri Cahya Utama

    2016-03-01

    From a unique standpoint, the timber industry in Jepara is deeply rooted to the culture and identity of the natives, making the attempt to separate the discussion between timber industry and the people of Jepara not only  imprudent but virtually impossible. By looking at the statistic in which Jepara’s public education level is assessed to be still below the national standard, and as well bearing to the general fact that the timber actors in Jepara are more focused on product sales rather than important technical aspects such as certification of origin, it should be projected that crimes such as fraud of origin could be easily committed in Jepara. This study is using a comparative advantage theory and theories or models of H-O to investigate how the practice of fraud of origin in Jepara occurs and how to resolve such problem.

  20. Preventing the threat of credit-card fraud: Factors influencing cashiers' identification-checking behavior.

    Science.gov (United States)

    Downing, Christopher; Howard, E Henry; Goodwin, Christina; Geller, E Scott

    2016-01-01

    Two studies examined factors influencing cashiers' identification (ID)-checking behavior in order to inform the development of interventions to prevent credit-card fraud. In both studies, research assistants made credit purchases in various stores and noted the cashiers' ID-checking behavior. In the first study, the store type, whether the cashier swiped the credit/debit card, the amount of the purchase, and whether the credit/debit card was signed significantly influenced ID-checking behavior. In the second study, an A-B-A design was used to evaluate the impact of a "Check my ID" prompt placed on the credit/debit card. The prompt increased cashiers' ID-checking behavior from 5.9% at Baseline to 10.3% during the Intervention. When the prompt was removed, the cashiers' ID-checking behavior decreased to 7.2%. Implications for further intervention research to prevent credit-card fraud are discussed.

  1. The Forensic Accountants' Skills and Ethics on Fraud Prevention in the Nigerian Public Sector

    Directory of Open Access Journals (Sweden)

    Lateef Saheed Ademola

    2017-12-01

    Full Text Available The study investigates the required skills and ethics of the forensic accountant in preventing fraudulent practices in the Nigerian public sector. The primary source of data was utilized for data collection. Using the simple random sampling (SRS, a total of 300 questionnaires were administered; 163 were retrieved. The data obtained was analyzed using SmartPLS - for measurement and structural model. One of the major findings revealed that skills requirement was significant predator of fraud prevention as well as ethics requirement. This means that the higher the skills and ethics of the forensic accountant, the better is the fraud prevention. It is thus, recommended that forensic accounting services should be made statutory in the Nigerian public sector to help in preventing fraudulent practices. Hence the need to create awareness and expand the application of forensic accounting services in Nigerian public sector.

  2. Fraud Prevention A Study In Regional Public Service Agency BLUD For Hospital In Malang Regency Indonesia

    Directory of Open Access Journals (Sweden)

    Koenta Adji Koerniawan

    2017-04-01

    Full Text Available This study aims to understand the effect of management perceptions in Regional Public Service Agency BLUD for Hospital in Malang regency Indonesia on the role of the Independent Auditor and their understanding towards Good Governance the General Audit Engagement and its implications for the prevention of corruption. This research is quantitative which placed latent variables General Audit Engagements as intervening variables. Partial Least Square PLS is used to confirm the model created in order to explain the relationship between variables. The results show that the perception of BLUD hospital management on the role of independent auditors and their understanding of good governance to give effect to the implementation of the audit engagement and the implications for the prevention of fraud in BLUDs hospital. This is consistent with the theory of auditing and fraud prevention concepts. JEL Classification M420 K420

  3. Independent Auditor's Approach to the Concept of Fraud in Accounting Standards

    Directory of Open Access Journals (Sweden)

    Handan Bulca

    2015-07-01

    Full Text Available Control in the field of standards, quality and safety can be increased fraud and error reduction is envisaged. In parallel with these changes, the conditions in the Official Gazette dated 14 March 2014 to companies that provide audit is mandatory. With the implementation of auditing standards and corporate companies will become more transparent. Information users more secure thanks to the information reaching these standards will be able to make healthy decisions. The study also has redefined the concept of independent auditors and the audit process should follow an independent auditor, is also indicated. The focus of the study of the risk of fraud and cheating, Independent Auditing Standards Number 240 constitutes in terms of views.

  4. EXTENDIENDO EL MODELO e-SCARF DE DETECCIÓN DE FRAUDE EN SISTEMAS DE COMERCIO ELECTRÓNICO EXTENDING THE e-SCARF MODEL FOR FRAUD DETECTION ON ELECTRONIC COMMERCE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Francisco Arias

    2008-09-01

    Full Text Available En este trabajo se extiende un modelo existente de detección de fraude, denominado SCARF, el cual está basado en una técnica de auditoría concurrente que consiste en la inserción de rutinas de auditoría dentro de un programa de aplicación, en este caso un sistema de comercio electrónico. Estas rutinas capturan datos de las transacciones electrónicas y son comparados con reglas que un usuario auditor ha definido previamente para detectar posibles transacciones fraudulentas. Para extender el modelo se incorporan como requerimientos la evaluación y sugerencias que un conjunto de 15 auditores realizaron a una segunda versión del modelo, denominada e-SCARF, así como también se incluyen mejoras propuestas por los autores de este trabajo. Para validar el modelo extendido, éste se ha implementado para que funcione en conjunto con una plataforma de comercio electrónico de pruebas y un conjunto de usuarios de distintos países han realizado la simulación de compras en dicha tienda. El producto principal de este trabajo es un modelo extendido, más robusto en sus funcionalidades que sus antecesores, con cambios en la estructura de datos, y nuevos operadores de reglas. Otro producto es el prototipo que lo implementa para una plataforma de comercio electrónico actual.In this work we extend a fraud detection model, called SCARF, which is based on a concurrent auditing technique that consists of inserting auditing procedures within an application program; in this case, an electronic commerce system. These procedures undertake the capture of electronic transactions data, which is compared with rules that are previously defined by an auditor with the purpose of detecting fraudulent transactions. To extend this model, we have a set of some requirements: 1 suggestions from a group of 15 auditors that evaluated the second version of this model, called e-SCARF; 2 improvements proposed by the authors of this work. To evaluate the extended model, we

  5. Infrastructure development through civil nuclear cooperation

    International Nuclear Information System (INIS)

    Humphrey, A.M.; Burkart, A.R.

    2010-01-01

    Due to growing concerns over electricity demand, energy security, and climate change, numerous countries are considering the construction of new nuclear power plants. Most of these will be built in nations with existing nuclear power programs, but an increasing number of States have expressed serious interest in developing new nuclear power programs. These countries will be faced with many challenges in establishing the robust infrastructures necessary for the safe, secure, and safeguarded deployment of nuclear power. Fortunately, there is much a State can gain through cooperation with other States with more developed programs. By sharing information on previous experience and established best practices, an emerging nuclear energy State can benefit from the lessons learned by its partners. Through a broad range of civil nuclear cooperation, the United States is helping new entrants develop the sound infrastructure necessary to deploy nuclear power plants with the highest standards of safety, security, and nonproliferation

  6. 5 CFR 919.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Civil judgment. 919.920 Section 919.920 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 919.920 Civil judgment. Civil judgment...

  7. 29 CFR 98.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Civil judgment. 98.920 Section 98.920 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction...

  8. 7 CFR 3017.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil judgment. 3017.920 Section 3017.920 Agriculture... AGRICULTURE GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 3017.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether...

  9. 14 CFR 1274.924 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil rights. 1274.924 Section 1274.924... FIRMS Other Provisions and Special Conditions § 1274.924 Civil rights. Civil Rights July 2002 Work on NASA cooperative agreements is subject to the provisions of Title VI of the Civil Rights Act of 1964...

  10. 29 CFR 1471.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Civil judgment. 1471.920 Section 1471.920 Labor Regulations... SUSPENSION (NONPROCUREMENT) Definitions § 1471.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  11. 31 CFR 19.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil judgment. 19.920 Section 19.920... SUSPENSION (NONPROCUREMENT) Definitions § 19.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  12. Communication Needs of Thai Civil Engineering Students

    Science.gov (United States)

    Kaewpet, Chamnong

    2009-01-01

    This article reports on an examination of the communication needs of a group of Thai civil engineering students. Twenty-five stakeholders helped identify the communication needs of the students by participating in individual interviews. These included employers, civil engineers, civil engineering lecturers, ex-civil engineering students of the…

  13. Uncovering Document Fraud in Maritime Freight Transport Based on Probabilistic Classification

    OpenAIRE

    Triepels , Ron; Feelders , Ad; Daniels , Hennie

    2015-01-01

    Part 4: Data Analysis and Information Retrieval; International audience; Deficient visibility in global supply chains causes significant risks for the customs brokerage practices of freight forwarders. One of the risks that freight forwarders face is that shipping documentation might contain document fraud and is used to declare a shipment. Traditional risk controls are ineffective in this regard since the creation of shipping documentation is uncontrollable by freight forwarders. In this pap...

  14. Detection of Fraud with Agent–Based Models: the 2006 Mexican Election

    OpenAIRE

    Gonzalo Castañeda; Ignacio Ibarra

    2010-01-01

    In this paper an innovative tool is applied for the detection of electoral fraud by analyzing statistical distributions of the official results. With this aim a computational model is developed to describe the dynamics of an electoral campaign that conditions the individuals' political preferences. The agent–based model is built assuming that in a clean process the electoral outcome depends, essentially, on preferences subjected to the influence of social interaction and global information. I...

  15. 6 Tip-offs to Rip-offs: Don't Fall for Health Fraud Scams

    Science.gov (United States)

    ... Español Subscribe: FDA Consumer Health Information Bogus product! Danger! Health fraud alert! You’ll never see these ... لعربية | Kreyòl Ayisyen | Français | Polski | Português | Italiano | Deutsch | 日本語 | ف ...

  16. Faktor-Faktor yang Berhubungan dengan Fraud Pengadaan Barang/Jasa di Lembaga Publik

    OpenAIRE

    Nurharjanti, Nashirotun Nisa

    2017-01-01

    The purpose of this study was to test whether the variable quality of the procurement committee of goods/services, quality of the patners goods/ services, systems and procedures for procurement of goods/services, ethical procurement of goods/services, environmental goods/services, and risk assessment have an influence on the procurement fraud goods/services in University. This study using survey method by distributing questionnaires in Asset Management and Maintenance Directorate of the Unive...

  17. Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    OpenAIRE

    Ikram, Muhammad; Onwuzurike, Lucky; Farooqi, Shehroze; De Cristofaro, Emiliano; Friedman, Arik; Jourjon, Guillaume; Kaafar, Mohammad Ali; Shafiq, M. Zubair

    2015-01-01

    As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between genuine likes and those generated by farm-controlled profiles. However, as we show in this paper,...

  18. Earnings management and financial reporting fraud: can external auditors spot the difference?

    OpenAIRE

    Kassem, Rasha

    2012-01-01

    The aim of this paper is to increase external auditors’ knowledge about earnings management and help them spot the difference between earnings management and financial reporting fraud. A thorough literature review was undertaken to achieve the paper’s aim. The secondary data used in this paper was obtained from different databases like Ebscohost, Business Search Premier, Academic Search Premier, Emerlad, Sciencedirect, and Jstor. The current paper suggests a new approach and way of thinking f...

  19. iBGP: A Bipartite Graph Propagation Approach for Mobile Advertising Fraud Detection

    OpenAIRE

    Hu, Jinlong; Liang, Junjie; Dong, Shoubin

    2017-01-01

    Online mobile advertising plays a vital financial role in supporting free mobile apps, but detecting malicious apps publishers who generate fraudulent actions on the advertisements hosted on their apps is difficult, since fraudulent traffic often mimics behaviors of legitimate users and evolves rapidly. In this paper, we propose a novel bipartite graph-based propagation approach, iBGP, for mobile apps advertising fraud detection in large advertising system. We exploit the characteristics of m...

  20. Pressure, Dysfunctional Behavior, Fraud Detection and Role of Information Technology in the Audit Process

    OpenAIRE

    Muhammad Umar; Shinta Megawati Sitorus; Rika Lusiana Surya; Elvia R. Shauki; Vera Diyanti

    2017-01-01

    This study examines the effect of information technology and pressure such as time budget and task complexity on dysfunctional audit behavior. This study tests whether dysfunctional audit behavior affects fraud detection. Data were gathered from 81 auditors in Jakarta and were analyzed using structure equation model (SEM). The results explain that pressure (time budget and complexity task) have some impacts on dysfunctional audit behavior while information technology does not affect dysfuncti...