30,456 research outputs found
Semi-Annual Report to Congress for the Period of October 1, 2002 to March 31, 2003
[Excerpt] It is a privilege to transmit this Semiannual Report to the Congress covering the period October 1, 2002, through March 31, 2003, summarizing the significant audit and investigative activities of the Office of Inspector General (OIG), U.S. Department of Labor (DOL). Moreover, I am pleased to introduce a new format for our report that makes use of advances in information technology and moves the OIG forward in the e-government environment. Readers will now receive a âHighlightsâ summary that emphasizes key audits and investigations conducted by the OIG. The Highlights contains information on how to visit our website and download the complete report. Our goal is to allow you to review snapshots of our work and quickly access those issues of most interest to you.
Of special note during this reporting period was the inclusion of statutory law enforcement authority for our investigators in the Homeland Security Act of 2002 (P.L. 107-296). This authority enhances our ability to investigate labor racketeering and fraud against pension plans, which has become increasingly important as other Federal law enforcement agencies redirect their resources toward homeland security activities.
Among our significant investigative accomplishments during this period was the indictment of 42 individuals including members and associates of the Genovese and Colombo La Cosa Nostra (LCN) organized crime families and Locals 14 and 15 of the Operating Engineers, for unlawful labor payments as well as other charges. Another investigation led to guilty pleas by associates of the Gambino LCN Family. In total, during this reporting period, our investigative work resulted in 337 indictments, 191 convictions, and over 174 million for fiscal years 1999â2002. This targeted work, as well as other audit work, identified nearly $184 million in questioned costs.
I am proud of the work of all OIG employees and their continued commitment to serving American workers and taxpayers. My staff and I look forward to continuing to work constructively with the Secretary and the DOL team to further our common goal of ensuring the effectiveness, efficiency, and integrity of the programs that serve and protect the rights and benefits of American workers and retirees
Risks of identity theft: Can the market protect the payment system?
Identity theft has been a feature of financial markets for as long as alternatives have existed to cash transactions. But identity theft has recently occurred on a much larger scale. Data breaches often involve the apparent loss or acknowledged theft of the personal identifying information of thousands--or millions--of people. ; Identity theft poses risks, not only to individuals, but to the integrity and efficiency of the payment system--the policies, procedures, and technology that transfer information for authenticating and settling payments among participants. Identity theft can cause a loss of confidence in the security of certain payment methods and an unwillingness to use them. Markets can cease operating or switch to less efficient payment methods. Either represents a loss of efficiency for the economy. ; Schreft looks at the nature of identity theft today and the factors underlying its mounting risks. She also explores whether markets are able to limit the risks identity theft poses to the payment system.Identity theft ; Payment systems
Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this âmosaic theoryâ and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by âthe peopleâ that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud
A Survey of Litigation in Corporate Finance
Purpose
The purpose of this paper is to review research on litigation in corporate finance. Design/methodology/approach
This paper surveys studies on the estimation of litigation risk, litigation costs, stock reaction to lawsuit announcement, and the effect of litigation on corporate financial policies and outcomes. Findings
The first section presents a survey of studies that estimate litigation risk. The authors then discuss a set of studies that focus on the various costs associated with litigation. The third area of review is about studies which estimate the market reaction to a lawsuit announcement. The next section surveys studies that examine the relation between litigation and a variety of corporate policies, behaviors, and outcomes. The authors then discuss the emerging literature on how corporate political connections can influence the outcome of litigation. The survey concludes with a brief summary and a discussion of suggestions for future research involving corporate litigation. Originality/value
By providing an extensive review of the literature on litigation in corporate finance, this survey can help researchers to identify recent trends in litigation research and select promising new avenues of investigation in the field
Recommended from our members
Immigration of Foreign Workers: Labor Tests and Protections
[Excerpt] Economic indicators confirm that the U.S. economy sunk into a recession in December 2007. Although some economic indicators suggest that growth has resumed, unemployment remains high and is projected to remain so for some time. Historically, international migration ebbs during economic crises; for example, immigration to the United States was at its lowest levels during the Great Depression. While preliminary statistical trends hint at a slowing of migration pressures, it remains unclear how the current economic recession will affect immigration. Addressing these contentious policy reforms against the backdrop of economic crisis sharpens the social and business cleavages and narrows the range of options.
Some employers maintain that they continue to need the âbest and the brightestâ workers, regardless of their country of birth, to remain competitive in a worldwide market and to keep their firms in the United States. While support for increasing employment-based immigration may be dampened by the high levels of unemployment, proponents argue that the ability to hire foreign workers is an essential ingredient for economic growth.
Those opposing increases in foreign workers assert that such expansionsâparticularly during a period of high unemploymentâwould have a deleterious effect on salaries, compensation, and working conditions of U.S. workers. Others question whether the United States should continue to issue foreign worker visas (particularly temporary visas) during a recession and suggest that a moratorium on such visas might be prudent.
The number of foreign workers entering the United States legally has notably increased over the past decade. The number of employment-based legal permanent residents (LPRs) grew from under 100,000 in FY1994 to over 250,000 in FY2005, and stood at 166,511 in 2008. The number of visas issued to employment-based temporary non-immigrants rose from just under 600,000 in FY1994 to approximately 1.3 million in FY2007. In FY2009, the number of visas issued to employment-based temporary nonimmigrants dropped slightly to 1.1 million.
The Immigration and Nationality Act (INA) bars the admission of any alien who seeks to enter the U.S. to perform skilled or unskilled labor, unless it is determined that (1) there are not sufficient U.S. workers who are able, willing, qualified, and available; and (2) the employment of the alien will not adversely affect the wages and working conditions of similarly employed workers in the United States. The foreign labor certification program in the U.S. Department of Labor (DOL) is responsible for ensuring that foreign workers do not displace or adversely affect working conditions of U.S. workers.
The 111th Congress has addressed one element of the labor market test for foreign workers issue in §1611 of P.L. 111-5, the American Recovery and Reinvestment Act of 2009, which requires companies receiving Troubled Asset Relief Program (TARP) funding to comply with the more rigorous labor market rules of H-1B dependent companies if they hire foreign workers on H-1B visas. Also, §524 of division D of the Consolidated Appropriations Act, 2010 (P.L. 111-117) authorized the Department of Labor to use its share of the H-1B, H-2B, and L Fraud Prevention and Detection fees to conduct wage and hour enforcement of industries more likely to employ any type of nonimmigrants (not just H-1B, H-2B or L visaholders).
This report does not track legislation and will be updated if policies are revised
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing, and as such, it can be utilised in a multitude of online investigations, ranging from employee vetting and credit checking to counter-terrorism and fraud prevention/detection. However, the search needs and behaviours of these investigators are not well documented in the literature. In order to address this gap, an in-depth qualitative study was carried out in cooperation with a leading investigation company. The research contribution is an initial identification of Open-Source Intelligence investigator search behaviours, the procedures and practices that they undertake, along with an overview of the difficulties and challenges that they encounter as part of their domain. This lays the foundation for future research in to the varied domain of Open-Source Intelligence gathering
Redescribing Health Privacy: The Importance of Health Policy
Current conversations about health information policy often tend to be based on three broad assumptions. First, many perceive a tension between regulation and innovation. We often hear that privacy regulations are keeping researchers, companies, and providers from aggregating the data they need to promote innovation. Second, aggregation of fragmented data is seen as a threat to its proper regulation, creating the risk of breaches and other misuse. Third, a prime directive for technicians and policymakers is to give patients ever more granular methods of control over data. This article questions and complicates those assumptions, which I deem (respectively) the Privacy Threat to Research, the Aggregation Threat to Privacy, and the Control Solution.
This article is also intended to enrich our concepts of âfragmentationâ and âintegrationâ in health care. There is a good deal of sloganeering around âfirewallsâ and âvertical integrationâ as idealized implementations of âfragmentationâ and âintegrationâ (respective). The problem, though, is that terms like these (as well as âdisruptionâ) are insufficiently normative to guide large-scale health system change. They describe, but they do not adequately prescribe.
By examining those instances where: a) regulation promotes innovation, and b) increasing (some kinds of) availability of data actually enhances security, confidentiality, and privacy protections, this article attempts to give a richer account of the ethics of fragmentation and integration in the U.S. health care system. But, it also has a darker side, highlighting the inevitable conflicts of values created in a âreputation societyâ driven by stigmatizing social sorting systems. Personal data control may exacerbate social inequalities. Data aggregation may increase both our powers of research and our vulnerability to breach. The health data policymaking landscape of the next decade will feature a series of intractable conflicts between these important social values
- âŠ