11 resultados para Mortgage fraud
em Université de Lausanne, Switzerland
Resumo:
Fraud is as old as Mankind. There are an enormous number of historical documents which show the interaction between truth and untruth; therefore it is not really surprising that the prevalence of publication discrepancies is increasing. More surprising is that new cases especially in the medical field generate such a huge astonishment. In financial mathematics a statistical tool for detection of fraud is known which uses the knowledge of Newcomb and Benford regarding the distribution of natural numbers. This distribution is not equal and lower numbers are more likely to be detected compared to higher ones. In this investigation all numbers contained in the blinded abstracts of the 2009 annual meeting of the Swiss Society of Anesthesia and Resuscitation (SGAR) were recorded and analyzed regarding the distribution. A manipulated abstract was also included in the investigation. The χ(2)-test was used to determine statistical differences between expected and observed counts of numbers. There was also a faked abstract integrated in the investigation. A p<0.05 was considered significant. The distribution of the 1,800 numbers in the 77 submitted abstracts followed Benford's law. The manipulated abstract was detected by statistical means (difference in expected versus observed p<0.05). Statistics cannot prove whether the content is true or not but can give some serious hints to look into the details in such conspicuous material. These are the first results of a test for the distribution of numbers presented in medical research.
Resumo:
Recent legislations oblige organizations to monitor the effectiveness of internal control mechanisms that are necessary to prevent fraud. However, little is known about the effectiveness of different internal controls. We investigate whether the duty to sign work results-one of the most prominent internal control mechanisms-is effective to prevent fraud under different superior instructions. We use a 2×2 between-subjects experimental design with accountability (duty to sign work results vs. no duty to sign) and superior instructions (with vs. without profit maximization cue) as independent variables. Both manipulations of superior instructions reminded people to respect accounting standards and principles but in one condition, an instruction to increase revenues was integrated as profit maximization cue. We expected this cue to trigger a profit maximization decision frame that increases the likelihood for fraudulent revenue recording. 58 managers from an executive MBA class participated in the experiment. We find that superior instructions interact with accountability. Fraudulent revenue recording was particularly observed when people received instructions to increase revenues and had to sign their work results. Consequently, fraudulent behavior can occur without pressure to commit fraud due to profit maximization cues that are communicated by a superior and despite implemented internal control mechanisms. We discuss possible implications of our results for the prevention of fraudulent behavior.
Resumo:
Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.
Resumo:
Summary: Victims of crime are not only physical persons. Firms also experience some different forms of victimization either from outsiders or front employees. Crimes committed inside the firm are various: theft, embezzlement, fraud, fraudulent management, money laundering, vandalism etc. Assessed damage could be considerable. But in general, most of the criminological studies relating to victimization have been interested in individuals as victims. In Switzerland, to date, research on firms'victimization is simply rare and traditional research methods such as victimization survey, self-reported delinquency or controlled experiments are not very much utilized in Swiss white-collar crime studies. Thus, in order to improve the situation, we have decided to start a victimization study on white-collar crime committed in firms of the canton of Geneva. To narrow the field of research, our project seeks to apprehend white-collar crime as a series of offences committed by employees inside the firm, by fraud or deceit, aiming at an illegitimate enrichment. The phenomenon of white-collar crime perpetrated has been evaluated by examining the presence of risk factors and prevention strategies. Furthermore, the correlation between the victimization rate and some aspects of vulnerability has also been investigated. Using data collected from the victimization survey carried out in 2005, some of the key research questions are the following: - which are the types of offences committed? - Which types of measure of prevention are the most efficient to prevent such offences ? - Which type of business is more vulnerable? - Which are the risk factors? - Which is the profile of the authors? - Which are the motivations?, etc. Findings show that companies which valorize their employees and pursue a transparent management style suffer a lower victimization rate. Further, the retail sector seems to be more affected than the financial sector and big firms are more vulnerable.
Resumo:
Identification is ever more important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity 'theft' or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity 'theft'. Commonly accepted definitions are lacking, thus blurring available statistics, and policies to combat this new crime are piecemeal at best. To assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects. As a first key step, this article introduces a typology of identity-related crime, consisting of conceptual, technical and legal categories, that can be used as a comprehensive framework for future research, countermeasures and policies related to identity related crime.
Resumo:
The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.
Resumo:
Opium purchasing campaigns, initiated in 1915, were abruptly interrupted ten years later following the discovery that the Douanes & Régies of the General Government of Indochina had been victim of a gigantic fraud. Various inquiries expedited with a view to establishing responsibility for the fiasco, involving purchases made at Luang Prabang in 1925, highlight the dysfunctions affecting the colonial civil service. The 1925 scandal revealed not only the difficulties encountered by the French in their attempts to control the drug trade, but also the prevailing circumstantial inefficiency of the colonial bureaucracy.
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.