Question

In: Accounting

I need more 10 pages research governmental fraud nicely and clearly. Do not provide me the...

I need more 10 pages research governmental fraud nicely and clearly. Do not provide me the others students paper. I need solid and nice.

Solutions

Expert Solution

There are many types of frauds in government make by govt. servants and also ministers.In research now a days fraud ratio increase in govt. sector.Research fraud explain by current issue given below-

Recent cases of research misconduct

In April 2016, a former University of Queensland professor, Bruce Murdoch, received a two-year suspended sentence after pleading guilty to 17 fraud-related charges. A number of these arose from an article he published in the European Journal of Neurology, which asserted a breakthrough in the treatment of Parkinson’s disease.

The sentencing magistrate found that Murdoch forged consent forms for study participants and that his research was “such as to give false hope to Parkinson’s researchers and Parkinson’s sufferers”.

She found there was no evidence at all that Murdoch had conducted the clinical trial on which his purported findings were based.

Murdoch’s plea of guilty and evidence that he was suffering from severe depression and dealing with a cancer diagnosis were factors that resulted in his jail sentence being suspended.

In 2015, Anna Ahimastos, who was employed at the Baker IDI Heart and Diabetes Institute in Melbourne, admitted to fabricating research on blood-pressure medications published in two international journals.

The research purported to establish that for patients with peripheral artery disease (PAD), intermittent claudication (a condition in which exercise induces cramping pain in the leg) treatment with a particular drug resulted in significant improvements.

It had significant ramifications for treatment of PAD and, presumably not coincidentally, also for uptake of the drug. Ahimastos’ research was later retracted from the Journal of the American Medical Association following an internal investigation by the Baker Institute. However, while she lost her employment, she was not criminally charged.

In recent years, other research fraud cases have been reported around the world, such as that involving anesthesiologist Scott Reuben, who faked at least 21 papers on his research on analgesia therapy.

His work sought to encourage surgeons to move away from the first generation of non-steroidal anti-inflammatories (NSAIDs) to multi-modal therapy utilising the newer COX-2 inhibitors.

Reuben was a prominent speaker on behalf of large pharmaceutical companies that produced the COX-2 drugs. After it emerged that he had forged the name of an alleged co-author and that in a study that purported to have data in relation to 200 patients, no data existed at all, he was charged with criminal fraud in relation to spurious research between 2000 and 2008.

He was sentenced to six months’ imprisonment after the plea on his behalf emphasised the toll that the revelations had taken upon his mental health.

In 2015, in the most highly publicised criminal case in the area so far, biomedical scientist Dong Pyou-Han, at Iowa State University, was sentenced to 57 months’ imprisonment for fabricating and falsifying data in HIV vaccine trials. He was also ordered to pay back US$7.2 million to the government agency that funded his research.

Harm caused by fake research

More commonly, though, instances of comparable fraud have not resulted in criminal charges – in spite of the harm caused.

In the Netherlands, for instance, over 70 articles by social psychology celebrity psychologist Diederik Stapel were retracted. His response was to publish a book, entitled in English Derailment, “telling all” about how easy it was to engage in scholarly fraud and what it was that led him to succumb to the temptation to do so.

The book gives memorable insights into the mind of an academic fraudster, including his grandiose aspirations to be the acknowledged leader in his field:

“My desire for clear simple solutions became stronger than the deep emotions I felt when I was confronted with the ragged edges of reality. It had to be simple, clear, beautiful and elegant. It had to be too good to be true.”

And then there’s the notorious case of the Japanese scientist Haruko Obokata, who claimed to have triggered stem-cell abilities in regular body cells.

An inability to replicate her findings resulted in an investigation. The inquiry revealed not just fraud in her postdoctoral stem cell research, but major irregularities in her doctorate. This resulted in the removal of her doctoral qualification, retraction of the papers, professional disgrace and resignation from her employment.

But the ripple effect was much wider. Obokata’s co-author/supervisor committed suicide. There was a large reduction in government funding of the research establishment that employed her. Her line of research into cells that have the potential to heal damaged organs, repair spinal cords and treat diseases such as Alzheimer’s and diabetes was discredited, and grave questions were asked about the academic glitches that allowed her to obtain her PhD.

Despite this, Obokata too published a book denying impropriety and displacing responsibility for her conduct onto others.

Accountability issue

It is easy to dismiss such examples of intellectual dishonesty as aberrations – rotten apples in an otherwise healthy scholarly barrel – or to speak of excessive pressures on researchers to publish.

But there is a wider accountability issue and a cultural problem within the conduct and supervision of research, as well as with how it is published.

A review of the 2,047 retractions listed in PubMed as of May 2012 found that 67.4% were attributable to misconduct. This included fraud or suspected fraud (43.4%), duplicate publication (14.2%) and plagiarism (9.8%).

This does not prove that the incidence of retractions is rising, and it may be that researchers and journal editors are getting better at identifying and removing papers that are either fraudulent or plainly wrong, but it strongly suggests that the checks and balances are too often inadequate until problems are belatedly exposed.

As for cultural issues, a 2012 survey by the British Medical Journal of more than 2,700 researchers found that 13% admitted knowledge of colleagues “inappropriately adjusting, excluding, altering or fabricating data” for the purpose of publication.

Why are researchers tempted to fake results?

Researchers may be tempted to falsify data for many reasons, such as to avoid losing funding. from www.shutterstock.com

The temptation for researchers to fake their results can take many forms.

It can be financial – to acquire money, to save money and to avoid losing money. It can be to advance one’s career. It can also be a desire to attract or maintain kudos or esteem, a product of narcissism, and the expression of an excessive commitment to ambition or productivity.

It can be to achieve ascendancy or retribution over a rival. Or it can be the product of anxiety about under-performance or associated with psychiatric conditions such as bipolar disorder.

What all of these motives have in common is that their outcome is intellectual dishonesty that can have extremely serious repercussions.

A difficulty is that research fraud is not difficult to perpetrate if premeditated.

Peer review

The check and balance of peer review in publication has, at best, a modest prospect of identifying such conduct.

In peer review, the primary data are not made available to the reviewer. All that the reviewer can do is scrutinise the statistics, the research methodology and the plausibility of the interpretation of the data.

If the fraud is undertaken “professionally”, and a study’s results are modestly and sensibly expressed, the reviewer is highly unlikely to identify the problem.

In 1830, the mathematician Charles Babbage classified scientific misconduct into “hoaxing” (making up results, but wanting the hoax at some stage to be discovered), “forging” (fabricating research outcomes), “trimming” (manipulating data) and “cooking” (unjustifiable selection of data).

Experience over the past 20 years suggests that outright forging of results is the most successful mechanism employed by the academically unscrupulous, although those who engage in forging often also tend to engage in trimming, cooking and plagiarism – their intellectual dishonesty tends to be expressed in more than one way.

Removing temptations

The challenges include how we can remove the temptations of such conduct.

Part of the answer lies with clear articulation of proprieties within codes of conduct. But much more is required.

A culture of openness in respect of data needs to be fostered. Supervision and collaboration need to be meaningful, rather than tokenistic. And there needs to be an environment that enables challenge to researchers’ methodologies and proprieties, whether by whistleblowers or others.

Publishers, journal editors and the funders of scholarly research need to refashion the culture of scholarly publication to reduce the practice of gift authorship, whereby persons who have not really contributed to publications are named as authors. The issue here is that multiple authorship can cloud responsibility for scholarly contribution and blur responsibilities for oversight across institutions by ethics committees.

Journals need to be encouraged to be prepared to publish negative results and critiques and analyses of the limitations of orthodoxies.

When allegations are made, they must be investigated in a way that is going to command respect and confidence from all stakeholders. There is much to be said for the establishment of an external, government-funded Office of Scholarly Integrity. This could be based on the model of the US Office of Research Integrity, which is resourced and empowered to investigate allegations of scholarly misconduct objectively and thoroughly.

Finally, there is a role for the criminal law to discourage grossly unethical conduct in research.

Where founders are swindled of their grants, institutions are damaged by fraud and research conduct is brazenly faked, such conduct is so serious as to justify the intrusion of the criminal law to punish, deter and protect the good name of scholarly research

This is social issue of research fraud in govt.frauds there are many aspect include.Fraud in govt. explain by Baker Tilly is given below -

Fraud in Government:

Prevention and detection

Have you ever heard the saying, “Don’t be that guy?” Well in this case, “Don’t be that government.” In a recent study,1 government and public administration was the second most likely industry to be impacted by fraud. A finding from that study showed the presence of anti-fraud controls is associated with reduced fraud losses and shorter fraud duration. Management and those charged with governance are responsible for ensuring these controls are in place. This article will explore common fraud schemes and provide prevention and detection controls that can be put in place to help mitigate fraud risk.

What is fraud?

Fraud is often defined as wrongful or criminal deception intended to result in financial or personal gain. The

impact of fraud ranges from financial loss to declines in organizational performance, credibility, and public
confidence. As a result, risk management strategies and internal control systems should be implemented,
monitored, and modified as necessary by management and governing bodies.

Who is responsible for fraud prevention?

According to American Institute of Certified Public Accountants (AICPA) auditing standards,2 the primary

responsibility for prevention and detection of fraud rests with those charged with governance and management.
There are a number of strategies3 to help management and public officials navigate the challenges associated
with prevention and detection of fraud.

1. Understand your organization and industry: Explore key drivers of revenue and related benchmarks, be active in the budget process and evaluate historical trends.

2. Brainstorm with department heads, key members of management, external and internal auditors
to identify fraud risks: Review material weaknesses, compliance findings, and control deficiencies
related to the financial and single audits. Also consider decentralized operations. Examples of control
weaknesses that contribute to fraud include: lack of internal controls, lack of management review,
override of existing controls, poor tone at the top, and lack of competent personnel.

3. Assess the tone at the top and the entity’s culture: It is imperative that organizations set an
appropriate tone at the top, one that demonstrates a commitment to honesty and ethical behavior.

4. Create a whistleblower policy: Establishing a whistleblower hotline and/or policy is critical. History has
shown that the initial detection of fraud most often occurs through a tip followed by management review,
internal audit, or by accident.

5. Understand the objective of a financial audit and a forensic audit: The Association of Certified
Fraud Examiners reports that less than 10% of frauds are discovered as a result of a financial audit
conducted by an independent accounting firm. That is because a financial auditor is required to obtain
reasonable assurance that the financial statements as a whole are free from material misstatement,
whether caused by fraud or error. There is a risk that, even though an audit is properly planned, material
misstatements may not be detected. Whereas, the objective of a forensic audit is to determine whether
fraud has/is occurring and to determine who is responsible.

While management and governing bodies are typically trusting, simple “blind faith” in a trusted employee alone is not sufficient. Management and governing bodies need to also verify what they are being told or shown. This begins by promoting an organizational culture of honesty and ethical behavior and includes spending time following through, holding others accountable, and asking probing questions. The simple tactic of verifying information can act as a deterrent, which could reduce the likelihood of fraud.

What common fraud schemes look like and how to prevent/detect fraud

Skimming. Money intended for the government that an individual takes for personal use. For example, cash

receipts may never get entered into the system or they may be entered, but then voided/manipulated. This type
of fraud is more likely to occur in unsupervised areas that lack controls over accepting cash.

Limit unsupervised cash collection locations. For remaining unsupervised cash collection locations, implement

procedures for reconciling receipts and ensure deposits are properly reviewed and supported. For all cash
collections, track, reconcile, and review adjustments made to fees charged and collected, and analyze deposits
over time to identify anomalies.

Forgery or alterations. Includes checks, p-cards, vendor invoices, or employee payroll that are forged or

altered. Be aware of a lack of security surrounding unwritten checks and signature stamps, little to no oversight
or segregation of responsibilities, and the failure to account for all checks, wires, and electronic payments.

Develop appropriate check processing and reconciliation procedures, and ensure the approval of disbursements

includes accounting for the entire sequence of payments (checks, wires, electronic payments, etc.). Do not pre-
sign checks. Require dual signatures. Finally, limit the number of bank accounts used by decentralized
locations. Someone independent of check processing and distribution should reconcile all bank accounts.

Unauthorized vendor distributions. Payments may be made to a fictitious vendor for goods never received or

a legitimate vendor for personal goods. Vulnerable situations that allow for unauthorized vendor distributions
occur in departments without effective oversight. Vulnerability may also stem from the lack of segregation
between ordering, receiving, and approval functions.

Create/update purchasing, procurement card, wire transfer, and vendor management policies. Purchasing

policies should address limits and purchasing authority; as well as authorization for users, daily and transaction
limits, and documentation requirements. When new vendors are created, limit access to select personnel who
are not involved in the disbursement or approval process. Ensure all new vendors are appropriately reviewed
and approved by a supervisor.

Unauthorized payroll disbursements. This can include fictitious employees, unauthorized pay increases, or

overtime. An inadequate review of employee timesheets or lack of reconciliation of payroll records to
disbursements is another gateway to unauthorized disbursements.

Enforce appropriate payroll process policies and controls. Similar to the creation of new vendors, creation of

new employees or financial disbursements in the payroll system should be limited to select personnel who are
not involved with the approval process. A supervisor should review new employees added to the system on a
regular basis, and review of payroll or financial disbursements should be assigned to someone independent of
the process.

Prevention/Detection

Conduct a fraud risk assessment: One of the most effective ways to prevent fraud is to conduct a fraud risk

assessment. This type of assessment will identify where and how fraud could occur, as well as who might be in
a position to commit fraud. Fraud risk assessments will also determine an overall rating for the risk (high,
medium, or low) and evaluate controls in place to detect those risks. Below are suggested components of a
fraud risk assessment, adapted from the Committee of Sponsoring Organizations of the Treadway
Commission’s (COSO) guidance on enterprise risk management, internal control and fraud deterrence4.

4 "Guidance on enterprise risk management, internal control and fraud deterrence." Committee of Sponsoring Organizations of the Treadway
Commission (COSO). May 14, 2013. http://www.coso.org/guidance.htm.


Related Solutions

please i need from someone to do for me a English documented research essay on the...
please i need from someone to do for me a English documented research essay on the causes of the Lebanese economic crisis it should be composed from: introduction, body 1 , body 2 , body 3, rebuttal, conclusion, links of articles that have be used to get information.
2) I would like to do a Marketing research on Macy company. Please provide me with...
2) I would like to do a Marketing research on Macy company. Please provide me with some information related to secondary data and primary data and what are the marketing problem in the marketing mix that I will have to research to solve for this company (Area of concern, area of improvement, eliminate and area of difficulty, etc. based on two items in the Marketing Mix (product, price, promotion, place).
I need research proposal of 4 to 5 pages for phd in the topic " The...
I need research proposal of 4 to 5 pages for phd in the topic " The determinants of resilience in an organization".
Can you please tell me what more information I need to provide to solve below problem?...
Can you please tell me what more information I need to provide to solve below problem? 1. Find out below using R Hints: Use iris dataset from R (built in data set in R) a) Create a new data frame called virginica.versicolor (that only contains these two species) the command I used: virginica.versicolor <- iris[iris$Species %in% c("versicolor", "virginica"), ] b) What is your null hypothesis regarding sepal lengths for the two species (virginica.versicolor) ? And what is your alternate hypothesis?...
Hello, I need to do a research and I choose my research question: Do the commercialization...
Hello, I need to do a research and I choose my research question: Do the commercialization and use of civilian drones respect our individual freedoms and privacy? Can you help me with ideas of Research Methodology including: 1. Restatement of research tasks: hypothesis or research questions; 2. Study population and sampling: description of study areas (where? why?), populations and the procedures for the sample selection; 3. Data collection: description of the tools (i.e. the survey instrument) and methods used (i.e....
I need some one to do these questions 100%. Please provide me Correct answers in 1-2...
I need some one to do these questions 100%. Please provide me Correct answers in 1-2 hours. I already lost time due to wrong answers. 1.Calculate the present value of a $1,000 zero-coupon bond with 10 years to maturity if the required annual interest rate is 6.5%. 2.A lottery claims its grand prize is $25 million, payable over 25 years at $1,000,000 per year. If the first payment is made immediately, what is this grand prize really worth? Use a...
1) Do projects that add more risk to our portfolio need to provide more reward? Do...
1) Do projects that add more risk to our portfolio need to provide more reward? Do projects that have high variance need to provide more reward? What asset has a beta of zero? What is the appropriate market rate of return for such a security? 2) Does CAPM takes care of default risk? Does the use of CAPM E(r) in the NPV formula takes care of the default risk? 3) What are the CAPM inputs? How would you estimate them?...
I need to do a research paper on self-esteem and job performance. I just need some...
I need to do a research paper on self-esteem and job performance. I just need some ideas to get me started
topic: spinal cord injury. i need to write atleast 10 pages of paper. this includes the...
topic: spinal cord injury. i need to write atleast 10 pages of paper. this includes the following info i need. 1 Introduction, 2 definition, 3. 2 theoretical perspectives, 4. how concept has changed over time, 5. current practice, 6. policy issues, 7. conclusion, 8 compare U.S. vs 3rd world country, 6 references
I need 2 Pages Typed on this. Opportunity Cost (or lost)    Read and think about the 10...
I need 2 Pages Typed on this. Opportunity Cost (or lost)    Read and think about the 10 Commandments from a Money Talks News Website. Go to Commandment #8 called “Always Consider Opportunity Cost”. Follow the instructions to review all the items in your home and garage, etc. that you have not touched in several months.      Figure out how much money you have spent and, by using the formula supplied by the author, figure how much money you could have had in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT