Search Results

open access

Immigration-Related Document Fraud: Overview of Civil, Criminal, and Immigration Consequences

Description: This report mainly discusses about the Overview of Civil, Criminal, and Immigration Consequences on Immigration-Related Document Fraud. It also discusses about the primary civil, criminal , and immigration related penalties associated with immigration related document fraud.
Date: December 18, 2006
Creator: Garcia, Michael John
Partner: UNT Libraries Government Documents Department
open access

Immigration-Related Document Fraud: Overview of Civil, Criminal, and Immigration Consequences

Description: This report mainly discusses about the Overview of Civil, Criminal, and Immigration Consequences on Immigration-Related Document Fraud. It also discusses about the primary civil, criminal , and immigration related penalties associated with immigration related document fraud.
Date: December 21, 2004
Creator: Garcia, Michael John
Partner: UNT Libraries Government Documents Department
captions transcript

[News Clip: McLarren]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story.
Date: May 13, 1997, 5:00 p.m.
Duration: 1 minute 38 seconds
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections
captions transcript

[News Clip: McLarren]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story.
Date: May 29, 1997, 6:00 p.m.
Duration: 47 seconds
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections
captions transcript

[News Clip: Fake Insurance (Smith)]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story.
Date: February 2, 1995, 10:00 p.m.
Duration: 3 minutes 09 seconds
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections
captions transcript

[News Clip: Fake Insurance (Smith)]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story.
Date: February 3, 1995, 10:00 p.m.
Duration: 2 minutes 25 seconds
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections
open access

Identity Theft: Trends and Issues

Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked wit… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Mail and Wire Fraud: A Brief Overview of Federal Criminal Law

Description: This report discusses ways in which mail and wire fraud can be federal crimes and penalties for conducting such crimes. It is a federal crime to devise a scheme to defraud another of property, when either mail or wire communications are used in furtherance of the scheme. Misconduct that constitutes mail or wire fraud may also constitute a violation of one or more other federal crimes.
Date: July 21, 2011
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Mail and Wire Fraud: An Abridged Overview of Federal Criminal Law

Description: This report discusses ways in which mail and wire fraud can be federal crimes and penalties for conducting such crimes. It is a federal crime to devise a scheme to defraud another of property, when either mail or wire communications are used in furtherance of the scheme. Misconduct that constitutes mail or wire fraud may also constitute a violation of one or more other federal crimes.
Date: July 21, 2011
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

QA/QC in the laboratory

Description: Quality assurance and quality control (QA/QC) of analytical chemistry laboratory activities are essential to the validity and usefulness of resultant data. However, in themselves, conventional QA/QC measures will not always ensure that fraudulent data are not generated. Conventional QA/QC measures are based on the assumption that work will be done in good faith; to assure against fraudulent practices, QA/QC measures must be tailored to specific analyses protocols in anticipation of intentional … more
Date: May 1, 1992
Creator: Hood, F. C.
Partner: UNT Libraries Government Documents Department
open access

Maximum likelihood continuity mapping for fraud detection

Description: The author describes a novel time-series analysis technique called maximum likelihood continuity mapping (MALCOM), and focuses on one application of MALCOM: detecting fraud in medical insurance claims. Given a training data set composed of typical sequences, MALCOM creates a stochastic model of sequence generation, called a continuity map (CM). A CM maximizes the probability of sequences in the training set given the model constraints, CMs can be used to estimate the likelihood of sequences not… more
Date: May 1, 1997
Creator: Hogden, J.
Partner: UNT Libraries Government Documents Department
open access

Towards general information theoretical representations of database problems

Description: General database systems are described from the General Systems Theoretical (GST) framework. In this context traditional information theoretical (statistical) and general information theoretical (fuzzy measure and set theoretical, possibilistic, and random set theoretical) representations are derived. A preliminary formal framework is introduced.
Date: June 1, 1997
Creator: Joslyn, C.
Partner: UNT Libraries Government Documents Department
open access

Threats to financial system security

Description: The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken … more
Date: June 1, 1997
Creator: McGovern, D.E.
Partner: UNT Libraries Government Documents Department
open access

Visualization of high-dimensional clusters using nonlinear magnification

Description: This paper describes a cluster visualization system used for data-mining fraud detection. The system can simultaneously show 6 dimensions of data, and a unique technique of 3D nonlinear magnification allows individual clusters of data points to be magnified while still maintaining a view of the global context. The author first describes the fraud detection problem, along with the data which is to be visualized. Then he describes general characteristics of the visualization system, and shows how… more
Date: December 31, 1998
Creator: Keahey, T.A.
Partner: UNT Libraries Government Documents Department
open access

Fraud detection in medicare claims: A multivariate outlier detection approach

Description: We apply traditional and customized multivariate outlier detection methods to detect fraud in medicare claims. We use two sets of 11 derived features, and one set of the 22 combined features. The features are defined so that fraudulent medicare providers should tend to have larger features values than non-fraudulent providers. Therefore we have an apriori direction ({open_quotes}large values{close_quotes}) in high dimensional feature space to search for the multivariate outliers. We focus on th… more
Date: April 1, 1997
Creator: Burr, T.; Hale, C. & Kantor, M.
Partner: UNT Libraries Government Documents Department
open access

Financial system loss as an example of high consequence, high frequency events

Description: Much work has been devoted to high consequence events with low frequency of occurrence. Characteristic of these events are bridge failure (such as that of the Tacoma Narrows), building failure (such as the collapse of a walkway at a Kansas City hotel), or compromise of a major chemical containment system (such as at Bhopal, India). Such events, although rare, have an extreme personal, societal, and financial impact. An interesting variation is demonstrated by financial losses due to fraud and a… more
Date: July 1, 1996
Creator: McGovern, D.E.
Partner: UNT Libraries Government Documents Department
open access

Credit card fraud detection: An application of the gene expression messy genetic algorithm

Description: This paper describes an application of the recently introduced gene expression messy genetic algorithm (GEMGA) (Kargupta, 1996) for detecting fraudulent transactions of credit cards. It also explains the fundamental concepts underlying the GEMGA in the light of the SEARCH (Search Envisioned As Relation and Class Hierarchizing) (Kargupta, 1995) framework.
Date: May 1, 1996
Creator: Kargupta, H.; Gattiker, J.R. & Buescher, K.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen