Contractor Fraud Against the Federal Government: Selected Federal Civil Remedies

Contractor Fraud Against the Federal Government: Selected Federal Civil Remedies

Date: April 1, 2014
Creator: Murrill, Brandon J.
Description: This report provides an overview of federal statutes that provide civil remedies for contractor fraud, as well as issues stemming from judicial interpretation of these statutes.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: January 16, 2014
Creator: Finklea, Kristin
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes selected trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule. It also examines possible issues for Congress to consider.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: May 27, 2010
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010. It also examines current legislation on identity theft and possible issues for the 111th Congress to consider.
Contributing Partner: UNT Libraries Government Documents Department
Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Federal Inspectors General: History, Characteristics, and Recent Congressional Actions

Date: December 8, 2014
Creator: Ginsberg, Wendy & Greene, Michael
Description: This report discusses federal inspectors general (IGs), who are authorized to combat waste, fraud, and abuse within their affiliated federal entities. To execute their missions, offices of inspector general (OIGs) conduct and publish audits and investigations--among other duties. Two major enactments--the Inspector General Act of 1978 and its amendments of 1988 (codified at 5 U.S.C. Appendix)--established federal IGs as permanent, nonpartisan, and independent offices in more than 70 federal agencies.
Contributing Partner: UNT Libraries Government Documents Department
Barriers to Corporate Fraud: How They Work, Why They Fail

Barriers to Corporate Fraud: How They Work, Why They Fail

Date: December 27, 2004
Creator: Jickling, Mark
Description: The report focuses on the internal controls on American corporations (including corporate governance, business ethics, managerial structure and compensation, internal counsel, and whistleblowers), as well as external controls (government regulation, external auditors and accountants, and the judicial process). A recurring theme is the limited efficacy of many safeguards and watchdogs in cases of "control fraud," where fraud is directed or abetted by top management, and where unethical or abusive practices may become the organizational norm. Another broad question raised by the report is whether the post-Enron scandals were a one-time event, made possible by the stock market bubble of the 1990s and several other unique historical developments which together constituted a "perfect storm," or whether fraud is a cyclical phenomenon associated with the end of long bull markets.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: August 26, 2009
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: May 27, 2009
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective November 1, 2009.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: January 5, 2010
Creator: Finklea, Kristin M.
Description: This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federal agencies involved in combating identity theft, and the trends in identity theft complaints and prosecutions. The report also discusses the relationship between data breaches and identity theft as well as possible effects of the FTC's Identity Theft Red Flags Rule, effective June 1, 2010.
Contributing Partner: UNT Libraries Government Documents Department
Identity Theft: Trends and Issues

Identity Theft: Trends and Issues

Date: February 15, 2012
Creator: Finklea, Kristin M.
Description: In 2010, about 8.1 million Americans were reportedly victims of identity fraud, and the average identity fraud victim incurred a mean of $631 in costs as a result of the fraud—the highest level since 2007. Identity theft is often committed to facilitate other crimes such as credit card fraud, document fraud, or employment fraud, which in turn can affect not only the nation's economy but its security. Consequently, in securing the nation and its economic health, policy makers are also tasked with reducing identity theft and its impact.
Contributing Partner: UNT Libraries Government Documents Department
Maximum likelihood continuity mapping for fraud detection

Maximum likelihood continuity mapping for fraud detection

Date: May 1, 1997
Creator: Hogden, J.
Description: The author describes a novel time-series analysis technique called maximum likelihood continuity mapping (MALCOM), and focuses on one application of MALCOM: detecting fraud in medical insurance claims. Given a training data set composed of typical sequences, MALCOM creates a stochastic model of sequence generation, called a continuity map (CM). A CM maximizes the probability of sequences in the training set given the model constraints, CMs can be used to estimate the likelihood of sequences not found in the training set, enabling anomaly detection and sequence prediction--important aspects of data mining. Since MALCOM can be used on sequences of categorical data (e.g., sequences of words) as well as real valued data, MALCOM is also a potential replacement for database search tools such as N-gram analysis. In a recent experiment, MALCOM was used to evaluate the likelihood of patient medical histories, where ``medical history`` is used to mean the sequence of medical procedures performed on a patient. Physicians whose patients had anomalous medical histories (according to MALCOM) were evaluated for fraud by an independent agency. Of the small sample (12 physicians) that has been evaluated, 92% have been determined fraudulent or abusive. Despite the small sample, these results are encouraging.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 NEXT LAST