511 resultados para Fraud offfender


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The beginning of the 21st century was plagued with unprecedented instances of corporate fraud. In an attempt to address apparent non-existent or “broken” corporate governance policies, sweeping measures of financial reporting reform ensued, having specific requirements relating to the composition of audit committees, the interaction between audit committees and external auditors, and procedures concerning auditors’ assessment of client risk. The purpose of my dissertation is to advance knowledge about “good” corporate governance by examining the association between meeting-or-beating analyst forecasts and audit fees, audit committee compensation, and audit committee tenure and “busyness”. Using regression analysis, I found the following: (1) the frequency of meeting-or-just beating (just missing) analyst forecasts is negatively (positively) associated with audit fees, (2) the extent by which a firm exceeds analysts’ forecasts is positively (negatively) associated with audit committee compensation that is predominately equity-based (cash-based), and (3) the likelihood of repeatedly meeting-or-just beating analyst forecasts is positively associated with audit committee tenure and “busyness”. These results suggest that auditors consider clients who frequently meet-or-just beat forecasts as being less “risky”, and clients that frequently just miss as being more “risky”. The results also imply that cash-based director compensation is more successful in preserving the effectiveness of the audit committee’s financial reporting oversight role, that equity-based compensation motivates independent audit committee directors to focus on short-term performance thereby aligning their interests with management, and that audit committee director tenure and the degree of director “busyness” can affect an audit committee member’s effectiveness in providing financial reporting oversight. Collectively, my dissertation provides additional insights regarding corporate governance practices and informs policy-makers for future relevant decisions.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Consumers are being ripped off by the food service industry when menus in establishments serving food misrepresent, substitute, and manipulate portions and the status of foods being served. A billion dollars a year in fraud is involved when menus offer the consumer one thing and deliver another.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research focuses on the design and verification of inter-organizational controls. Instead of looking at a documentary procedure, which is the flow of documents and data among the parties, the research examines the underlying deontic purpose of the procedure, the so-called deontic process, and identifies control requirements to secure this purpose. The vision of the research is a formal theory for streamlining bureaucracy in business and government procedures. ^ Underpinning most inter-organizational procedures are deontic relations, which are about rights and obligations of the parties. When all parties trust each other, they are willing to fulfill their obligations and honor the counter parties’ rights; thus controls may not be needed. The challenge is in cases where trust may not be assumed. In these cases, the parties need to rely on explicit controls to reduce their exposure to the risk of opportunism. However, at present there is no analytic approach or technique to determine which controls are needed for a given contracting or governance situation. ^ The research proposes a formal method for deriving inter-organizational control requirements based on static analysis of deontic relations and dynamic analysis of deontic changes. The formal method will take a deontic process model of an inter-organizational transaction and certain domain knowledge as inputs to automatically generate control requirements that a documentary procedure needs to satisfy in order to limit fraud potentials. The deliverables of the research include a formal representation namely Deontic Petri Nets that combine multiple modal logics and Petri nets for modeling deontic processes, a set of control principles that represent an initial formal theory on the relationships between deontic processes and documentary procedures, and a working prototype that uses model checking technique to identify fraud potentials in a deontic process and generate control requirements to limit them. Fourteen scenarios of two well-known international payment procedures—cash in advance and documentary credit—have been used to test the prototype. The results showed that all control requirements stipulated in these procedures could be derived automatically.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research focuses on the design and verification of inter-organizational controls. Instead of looking at a documentary procedure, which is the flow of documents and data among the parties, the research examines the underlying deontic purpose of the procedure, the so-called deontic process, and identifies control requirements to secure this purpose. The vision of the research is a formal theory for streamlining bureaucracy in business and government procedures. Underpinning most inter-organizational procedures are deontic relations, which are about rights and obligations of the parties. When all parties trust each other, they are willing to fulfill their obligations and honor the counter parties’ rights; thus controls may not be needed. The challenge is in cases where trust may not be assumed. In these cases, the parties need to rely on explicit controls to reduce their exposure to the risk of opportunism. However, at present there is no analytic approach or technique to determine which controls are needed for a given contracting or governance situation. The research proposes a formal method for deriving inter-organizational control requirements based on static analysis of deontic relations and dynamic analysis of deontic changes. The formal method will take a deontic process model of an inter-organizational transaction and certain domain knowledge as inputs to automatically generate control requirements that a documentary procedure needs to satisfy in order to limit fraud potentials. The deliverables of the research include a formal representation namely Deontic Petri Nets that combine multiple modal logics and Petri nets for modeling deontic processes, a set of control principles that represent an initial formal theory on the relationships between deontic processes and documentary procedures, and a working prototype that uses model checking technique to identify fraud potentials in a deontic process and generate control requirements to limit them. Fourteen scenarios of two well-known international payment procedures -- cash in advance and documentary credit -- have been used to test the prototype. The results showed that all control requirements stipulated in these procedures could be derived automatically.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces two new datasets on national level elections from 1975 to 2004. The data are grouped into two separate datasets, the Quality of Elections Data and the Data on International Election Monitoring. Together these data sets provide original information on elections, election observation and election quality, and will enable researchers to study a variety of research questions. The datasets will be publicly available and are maintained at a project website.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Online Romance Scam is a relatively new form of fraud that became apparent in about 2008. In this crime, criminals pretend to initiate a relationship through online dating sites then defraud their victims of large sums of money. This paper presents some descriptive statistics about knowledge and victimization of the online dating romance scam in Great Britain. Our study found that despite its newness, an estimated 230,000 British citizens may have fallen victim to this crime. We conclude that there needs to be some rethinking about providing avenues for victims to report the crime or at least making them more comfortable when doing so.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study focuses on two areas: alchemy (Part I) and rituals of initiation (Part II) in the works of Miguel de Cervantes, focusing on Don Quijote de la Mancha as my main case study. The first part analyses the function of alchemy and how it can be interpreted throughout the works and various literary genres of Cervantes. It will demonstrate that the texts of Cervantes contain both explicit and implicit allusions to, as well as different aspects of alchemy, such as operative and spiritual alchemy and how these are ultimately used by Cervantes as a means of expression. The author draws from this rich source and modifies these means of expression in order to achieve various results: sometimes with wit or in relation to fraud; at other times it focuses on inner alchemy relating to chivalry in what I have called spiritual chivalry, which has the aim of self-improvement and ultimately, gnosis. Regarding the chivalric rituals of initiation, according to this investigation chivalry serves as both satire and representation of the alchemical process in the case of Don Quijote, which finds its key moments during the rituals. In this sense alchemy and chivalry are studied as two sides of the same coin, in which the search for something higher, an object (the philosopher stone, the beloved), subjects the protagonist to continuous transmutations and puts him in contact with the transitory, that is, liminal states, people and spaces. From this perspective Don Quixote de la Mancha is built upon liminal poetics. My approach, which follows the tenets of analogical hermeneutics, is included within the framework of the Western Esotericism Studies. The 16th and 17th centuries were a fertile age for alchemy throughout Europe. In Spain, alchemy and other esoteric disciplines co-existed with the Spanish Inquisition and its body for the control of ideas and texts: censorship. By being ambiguous and putting into dialogue different ideas of alchemy, Cervantes not only allowed readers to reach their own conclusions, he also protected his work from censorship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Työn tavoitteena on selventää takuun yleisiä periaatteita ja esittää lukijalle kattavasti erilaiset takuumallit ja -politiikat. Tavoitteena on, että lukija ymmärtää takuun osana isompaa kokonaisuutta ja kuinka takuuta voidaan käyttää markkinoinnin keinona. Työssä tuodaan esille myös takuuaikaisten petosten ominaispiirteitä, sekä pohditaan takuuaikaisten petosten aiheuttamia kustannuksia. Työ on kirjallisuuskatsaus, joka on laadittu pääosin takuuta ja takuukustannuksia käsittelevän kirjallisuuden sekä aiheeseen liittyvien tieteellisten artikkeleiden pohjalta. Petoksista on hyvin vähän löydettävissä tieteellisiä julkaisuja, joten petosten ja niiden kustannusten käsittely pohjautuu pääasiassa uutisiin ja erilaisiin aihetta käsitteleviin ammatillisiin internetlähteisiin. Tuloksena voidaan todeta takuun ja takuukustannusten olevan hyvin monipuolinen ja haastava kokonaisuus. Yrityksille onkin tärkeää hallita tuotteidensa takuita ja tarkkailla niistä aiheutuneita kustannuksia. Toisaalta yrityksille avautuu takuun kautta loistavia mahdollisuuksia parantaa myyntiään, jos takuuta saadaan käytettyä markkinoinnissa apuna. Takuun ja hinnan optimointi on monimutkaisista malleista johtuen haastavaa, mutta toisaalta niillä voidaan saavuttaa merkittävää kilpailuetua kilpailijoihin nähden. Takuukustannusten ymmärtäminen ja hallitseminen vaatii paljon resursseja ja matemaattisten mallien käyttö on haastavaa ja siksi yritysten täytyy tehdä kompromisseja resurssien käytön suhteen. Lisäksi petosten todettiin aiheuttavan vuosittain merkittävästi kustannuksia valmistajille. Joidenkin lähteiden mukaan jopa 10–15% takuukustannuksista on petoksellisesti aiheutettuja.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-08

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A carne continua a ser a fonte proteica mais comum no quotidiano das pessoas. Além disso, os produtos cárneos processados apresentam-se como uma mais-valia nas suas vidas agitadas. Este tipo de produto torna difícil a diferenciação das carnes utilizadas na sua confecção, sendo por isso propícios a adulteração. A Reacção em Cadeia da Polimerase (PCR) tem ganho cada vez mais importância nos laboratórios de biologia molecular, revelando-se uma técnica de análise rápida, sensível e altamente específica na identificação de espécies em produtos alimentares. No entanto, vários factores podem interferir com o processo de amplificação, pelo que alguns cuidados devem ser implementados desde a aquisição da amostra a analisar, ao seu acondicionamento e posterior extração de ADN. Existem inúmeros protocolos de extração de ADN, devendo para cada estudo avaliar-se e optar-se pelo mais adequado, considerando a finalidade estabelecida para a amostra extraída. O trabalho laboratorial apresentado nesta dissertação baseou-se em três etapas principais. Inicialmente, avaliaram-se diferentes protocolos de extração de ADN, utilizando-se amostras de carne adquiridas num talho. Entre os protocolos testados, o método de Brometo de Cetil-Trimetil-Amónio (CTAB) modificado foi o que permitiu obter amostras de ADN com maior concentração e elevado nível de pureza. Posteriormente, foram testados e optimizados diferentes protocolos de amplificação, por PCR em tempo real, para a detecção das espécies Bos taurus (vaca), Sus scrofa (porco), Equus caballus (cavalo) e Ovis aries (ovelha). Foram empregues primers específicos de espécie para a detecção de genes mitocondriais e genómicos, consoante cada protocolo. Para o caso concreto do porco, foi efectuada a avaliação de dois protocolos, singleplex com EvaGreen® e tetraplex com AllHorse, para possível aplicação dos mesmos na sua quantificação. Os resultados demonstraram elevada especificidade e sensibilidade das reacções para esta espécie, permitindo a sua detecção até um limite de 0,001 ng e 0,1%, respectivamente. Somente a primeira metodologia se mostrou adequada para quantificação. Por último, as metodologias sugeridas foram aplicadas com sucesso na análise de 4 amostras comerciais de hambúrgueres, tendo-se verificado a consistência da rotulagem em todos os casos, no que concerne a composição em termos de espécies animais. O interesse de trabalhos neste âmbito recai na importância da autenticidade dos rótulos de produtos alimentares, principalmente nos produtos cárneos, para segurança dos consumidores e salvaguarda dos produtores.