30,456 research outputs found

    Semi-Annual Report to Congress for the Period of October 1, 2002 to March 31, 2003

    Get PDF
    [Excerpt] It is a privilege to transmit this Semiannual Report to the Congress covering the period October 1, 2002, through March 31, 2003, summarizing the significant audit and investigative activities of the Office of Inspector General (OIG), U.S. Department of Labor (DOL). Moreover, I am pleased to introduce a new format for our report that makes use of advances in information technology and moves the OIG forward in the e-government environment. Readers will now receive a “Highlights” summary that emphasizes key audits and investigations conducted by the OIG. The Highlights contains information on how to visit our website and download the complete report. Our goal is to allow you to review snapshots of our work and quickly access those issues of most interest to you. Of special note during this reporting period was the inclusion of statutory law enforcement authority for our investigators in the Homeland Security Act of 2002 (P.L. 107-296). This authority enhances our ability to investigate labor racketeering and fraud against pension plans, which has become increasingly important as other Federal law enforcement agencies redirect their resources toward homeland security activities. Among our significant investigative accomplishments during this period was the indictment of 42 individuals including members and associates of the Genovese and Colombo La Cosa Nostra (LCN) organized crime families and Locals 14 and 15 of the Operating Engineers, for unlawful labor payments as well as other charges. Another investigation led to guilty pleas by associates of the Gambino LCN Family. In total, during this reporting period, our investigative work resulted in 337 indictments, 191 convictions, and over 55.6millioninmonetaryaccomplishments.Fromanauditperspective,weissuedaseriesofreportsduringthisperiodrelatedtotheWorkforceInvestmentAct(WIA)includingyouthtrainingprograms,individualtrainingaccounts,andtheamountofWIAfundingavailabletostates.WehopethesereportsandrecommendationswilloffervaluableinformationastheCongressconsidersWIAreauthorization.WealsoreportedtheresultsofourworkwithrespecttoFlorida’scloseoutofitsjobtraininggrants,whichidentifiedsignificantdiscrepanciesbetweentheState2˘7sfinancialstatusreportsanditsofficialaccountingrecords.Alsosignificantthisperiodwasourfollow−upauditofoverchargesbytheInternalRevenueServicetotheUnemploymentTrustFundthattotaled55.6 million in monetary accomplishments. From an audit perspective, we issued a series of reports during this period related to the Workforce Investment Act (WIA) including youth training programs, individual training accounts, and the amount of WIA funding available to states. We hope these reports and recommendations will offer valuable information as the Congress considers WIA reauthorization. We also reported the results of our work with respect to Florida’s closeout of its job training grants, which identified significant discrepancies between the State\u27s financial status reports and its official accounting records. Also significant this period was our follow-up audit of overcharges by the Internal Revenue Service to the Unemployment Trust Fund that totaled 174 million for fiscal years 1999–2002. This targeted work, as well as other audit work, identified nearly $184 million in questioned costs. I am proud of the work of all OIG employees and their continued commitment to serving American workers and taxpayers. My staff and I look forward to continuing to work constructively with the Secretary and the DOL team to further our common goal of ensuring the effectiveness, efficiency, and integrity of the programs that serve and protect the rights and benefits of American workers and retirees

    Risks of identity theft: Can the market protect the payment system?

    Get PDF
    Identity theft has been a feature of financial markets for as long as alternatives have existed to cash transactions. But identity theft has recently occurred on a much larger scale. Data breaches often involve the apparent loss or acknowledged theft of the personal identifying information of thousands--or millions--of people. ; Identity theft poses risks, not only to individuals, but to the integrity and efficiency of the payment system--the policies, procedures, and technology that transfer information for authenticating and settling payments among participants. Identity theft can cause a loss of confidence in the security of certain payment methods and an unwillingness to use them. Markets can cease operating or switch to less efficient payment methods. Either represents a loss of efficiency for the economy. ; Schreft looks at the nature of identity theft today and the factors underlying its mounting risks. She also explores whether markets are able to limit the risks identity theft poses to the payment system.Identity theft ; Payment systems

    Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e

    Get PDF
    In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by “the people” that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud

    A Survey of Litigation in Corporate Finance

    Get PDF
    Purpose The purpose of this paper is to review research on litigation in corporate finance. Design/methodology/approach This paper surveys studies on the estimation of litigation risk, litigation costs, stock reaction to lawsuit announcement, and the effect of litigation on corporate financial policies and outcomes. Findings The first section presents a survey of studies that estimate litigation risk. The authors then discuss a set of studies that focus on the various costs associated with litigation. The third area of review is about studies which estimate the market reaction to a lawsuit announcement. The next section surveys studies that examine the relation between litigation and a variety of corporate policies, behaviors, and outcomes. The authors then discuss the emerging literature on how corporate political connections can influence the outcome of litigation. The survey concludes with a brief summary and a discussion of suggestions for future research involving corporate litigation. Originality/value By providing an extensive review of the literature on litigation in corporate finance, this survey can help researchers to identify recent trends in litigation research and select promising new avenues of investigation in the field

    Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts

    Get PDF
    The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing, and as such, it can be utilised in a multitude of online investigations, ranging from employee vetting and credit checking to counter-terrorism and fraud prevention/detection. However, the search needs and behaviours of these investigators are not well documented in the literature. In order to address this gap, an in-depth qualitative study was carried out in cooperation with a leading investigation company. The research contribution is an initial identification of Open-Source Intelligence investigator search behaviours, the procedures and practices that they undertake, along with an overview of the difficulties and challenges that they encounter as part of their domain. This lays the foundation for future research in to the varied domain of Open-Source Intelligence gathering

    Redescribing Health Privacy: The Importance of Health Policy

    Get PDF
    Current conversations about health information policy often tend to be based on three broad assumptions. First, many perceive a tension between regulation and innovation. We often hear that privacy regulations are keeping researchers, companies, and providers from aggregating the data they need to promote innovation. Second, aggregation of fragmented data is seen as a threat to its proper regulation, creating the risk of breaches and other misuse. Third, a prime directive for technicians and policymakers is to give patients ever more granular methods of control over data. This article questions and complicates those assumptions, which I deem (respectively) the Privacy Threat to Research, the Aggregation Threat to Privacy, and the Control Solution. This article is also intended to enrich our concepts of “fragmentation” and “integration” in health care. There is a good deal of sloganeering around “firewalls” and “vertical integration” as idealized implementations of “fragmentation” and “integration” (respective). The problem, though, is that terms like these (as well as “disruption”) are insufficiently normative to guide large-scale health system change. They describe, but they do not adequately prescribe. By examining those instances where: a) regulation promotes innovation, and b) increasing (some kinds of) availability of data actually enhances security, confidentiality, and privacy protections, this article attempts to give a richer account of the ethics of fragmentation and integration in the U.S. health care system. But, it also has a darker side, highlighting the inevitable conflicts of values created in a “reputation society” driven by stigmatizing social sorting systems. Personal data control may exacerbate social inequalities. Data aggregation may increase both our powers of research and our vulnerability to breach. The health data policymaking landscape of the next decade will feature a series of intractable conflicts between these important social values
    • 

    corecore