Wednesday, November 27, 2019
Titanosaurus Facts and Figures
Titanosaurus Facts and Figures Name: Titanosaurus (Greek for Titan lizard); pronounced tie-TAN-oh-SORE-us Habitat: Woodlands of Asia, Europe, and Africa Historical Period: Late Cretaceous (80-65 million years ago) Size and Weight: About 50 feet long and 15 tons Diet: Plants Distinguishing Characteristics: Short, thick legs; massive trunk; rows of bony plates on the back About Titanosaurus Titanosaurus is the signature member of the family of dinosaurs known as titanosaurs, which were the last sauropods to roam the earth before the K/T Extinction 65 million years ago. Whats odd is that, although paleontologists have discovered plenty of titanosaurs- the remains of these giant beasts have been dug up all over the globe- theyre not so sure about the status of Titanosaurus: this dinosaur is known from very limited fossil remains, and to date, no one has located its kull. This seems to be a trend in the dinosaur world; for example, hadrosaurs (duck-billed dinosaurs) are named after the extremely obscure Hadrosaurus, and the aquatic reptiles known as pliosaurs are named after the equally murky Pliosaurus. Titanosaurus was discovered very early in dinosaur history, identified in 1877 by paleontologist Richard Lydekker on the basis of scattered bones unearthed in India (not normally a hotbed of fossil discovery). Over the next few decades, Titanosaurus became a wastebasket taxon, meaning that any dinosaur that even remotely resembled it wound up being assigned as a separate species. Today, all but one of these species have either been downgraded or promoted to genus status: for example, T. colberti is now known as Isisaurus, T. australis as Neuquensaurus, and T. dacus as Magyarosaurus. (The one remaining valid species of Titanosaurus, which still remains on very shaky ground, is T. indicus.) Lately, titanosaurs (but not Titanosaurus) have been generating headlines, as bigger and bigger specimens have been discovered in South America. The largest dinosaur yet known is a South American titanosaur, Argentinosaurus, but the recent announcement of the evocatively named Dreadnoughtus may imperil its place in the record books. There are also a few as-yet-unidentified titanosaur specimens that may have been even bigger, but we can only know for sure pending further study by experts.
Saturday, November 23, 2019
Vitiligo Essays - Vitiligo, Depigmentation, PUVA Therapy
Vitiligo Essays - Vitiligo, Depigmentation, PUVA Therapy Vitiligo Skin Disorder: Vitiligo Vitiligo is a skin condition whose exact cause is unknown. In vitiligo, patches of skin lose their pigmentation when the pigment producing cells, the 'melanocytes' are attacked and destroyed. It may affect the skin, mucous membranes, eyes, inner ear or hairs leaving white patches. The usual type of vitiligo is called 'Vitiligo Vulgaris' (means: common vitiligo). Variant types include linear, segmental, trichrome and inflammatory vitiligo. This disease affects an estimated 1% of the world's population. It affects individuals of all ethnic origins and both sexes, but is much more easily noticed on darker skin as areas that fail to tan. It is hereditary in one third of those affected. Vitiligo often starts on the hands, feet or face, and frequently pigment loss is progressive. Half the patients first notice vitiligo before 20 years of age. It often appears in an area of minor injury or sunburn. It is believed that vitiligo is an autoimmune disorder (autoimmune means the body?s own immune system turns on itself). Certain white blood cells direct the destruction of melanocytes. People with vitiligo are also somewhat more prone to other autoimmune diseases, such as alopecia areata, autoimmune thyroid disorders, Addison's disease, pernicious anemia, and diabetes mellitus. The diagnosis of vitiligo is usually straightforward, and no special testing is needed. While vitiligo is a cosmetic problem and does not affect the health directly, it is disfiguring and may be psychologically traumatic. The condition cannot be cured at present, but treatments are available that may be very helpful. Medical treatments target the immune system, and try to reverse the destruction. Surgical treatments are less commonly done, and transplant healthy melanocytes from other areas. Both treatments may be difficult and prolonged. The goal is to restore the skin's color by restoring healthy melanocytes to the skin (repigmentation) allowing the skin to regain its normal appearance. That means that new pigment cells must come from the base of hair follicles, from the edge of the lesion, or from the patch of vitiligo itself if depigmentation is not complete. Repigmentation occurs slowly as the cells creep back in over months to years. Prescription steroid creams are the safest and simplest initial treatment, especially for recently diagnosed or spreading vitiligo. They are usually applied twice daily, and results require three to six months. If over-dosed or over-used then side effects include local skin damage, and glaucoma or cataracts when used around the eyes. Regular monitoring and adjusting the potency of the creams to be appropriate for the location can avoid these side effects. For extensive vitiligo, oral medications for repigmentation can be tried. The treatment most commonly used is PUVA (Psoralen & Ultra-Violet A light). PUVA is partially successful in over half of those treated, but complete repigmentation occurs in only 15-20%. Treatments are given in the office in a special booth 2 or 3 times weekly. It takes at least 2-3 months to begin having an effect and 200 treatment sessions are not unusual. Some insurance plans no longer cover this. Older people, those with pigment loss for more than 5 years and the hands and feet areas usually respond poorly. Another method of psoralen treatment, used occasionally for children or patients with small, scattered vitiligo patches, involves the application of a very dilute solution of the drug directly to the affected skin area. This is then exposed to sunlight. Such topical treatment makes a person very susceptible to severe burn and blisters following too much sun exposure. It has the advantages of being done at home, and does not damage the entire skin surface, as PUVA does. Recently, some experts have claimed that another form of light treatment, UVB, is just as effective and safer. If a person doesn't respond to PUVA treatment, and the vitiligo has not changed in the last year one may consider surgical treatment of vitiligo. Avoid surgical treatment if one scars abnormally or sometimes have lost pigment after a small cut or scrape. All surgical therapies must be viewed as experimental because their effectiveness and side effects remain to be fully defined. Autologous skin grafts take normal, pigmented skin from one area of a patient's body (donor sites) and attach it to an area of vitiligo. This type of skin grafting is
Thursday, November 21, 2019
Discuss the role of multinationals in the globalisation of innovation Essay - 1
Discuss the role of multinationals in the globalisation of innovation - Essay Example Strategies employed by MNEs in the globalisation of innovation One strategy used by MNEs is foreign direct investment (FDI) where MNEs acquire existing assets abroad or set up new wholly or majority owned investments abroad. Other modalities of spreading innovation by MNEs include trade, licensing, cross-patenting initiatives, and international scientific and technological collaborations. Trade involves the exchange of sophisticated products such as electrical and electronic products, precision instruments, fine chemicals and pharmaceuticals (Narula and Zanfei, 2003, P.7). Exports of such products and especially information and technology products worldwide rose from 8% in 1976 to 23% in 2000. The massive increase in the share of world trade represented by research and development intensive sectors signals an increase in globalisation of innovation (Narula and Guimon, 2009, P.5). There has been a steady growth in international patenting trends characterised by non-resident patenting, which is patent applications of foreign investors in a country, and external patenting, which is patent applications of national investors abroad. ... STPs are more common in the domain of biotechnology, new materials and information technology and oftenly involve Triad nations rather than emerging economies. Developed nationsââ¬â¢ firms take up over 90% of STP agreements while the share of STPs involving developing country firms is in the range of 5-6%. 70% of all STPs have had at least one US partner since 1960 (UNCTAD, 2005, P.51). The concentration of STPs in highly industrialised countries together with the involvement of American firms can be attributed to the fact that industrialised countries are the largest investors in R&D (Welfens, 1999, P.342). As a result of government regulation, some MNEs are forced to adopt STPs in place of internal innovation. Such situations include where firms form R&D alliances aiming to enter foreign markets protected by non-tariff barriers such environmental regulation in the chemical industries or safety standards in the automobile industry. STPs are common where partner companies share co mplementary capabilities and the integration creates a greater degree of interaction between the partnerââ¬â¢s respective paths of learning and innovation. Cooperation helps firms keep up with technological advancements and assists firms in exploring and exploiting emerging technological opportunities (Chen, 2003, P.397). MNEs engage in considerable intra-firm and inter-firm trade with industrialised countries, and this contributed almost 90% of all outbound FDI in 2001. Most of the firms engaged in FDI are also key players in the generation and diffusion of innovation. Over 30% of the top 100 MNEs are involved in R&D intensive industries such as electronic and electrical equipment,
Wednesday, November 20, 2019
Risks of Social Networking Essay Example | Topics and Well Written Essays - 750 words
Risks of Social Networking - Essay Example As such, many users often gain friends they know little about in terms of their behaviors and morals. Friends may post photos of them engaging in delinquent behavior such as smoking or indulgence in alcohol and since another surfer may not want to feel ââ¬Ëleft outââ¬â¢ engages in the same behavior to ââ¬Ëfit inââ¬â¢ and create a name for themselves. Cyber grooming is also a risk for many surfers. With cyber grooming, predatory pedophiles pose as young attractive people, with whom the victim can identify with, but also older, appearing to have money, cars and other attractive possessions for their victim. As Haigh notes, young people expose themselves to real danger when they give out their personal information like their address, personal phone number and where they like to hung out (19). In most cases as the writer notes, the perpetrator usually only needs the teenagerââ¬â¢s photo and the color of the school uniform to figure out which school they attend. Once there is trust between the two, the predator may then plan out their crime, for instance in kidnapping cases, or involve the teenager in pornographic films. Many young surfers often expose themselves to cyber-bullying. Many times, a personââ¬â¢s image once uploaded may be used by malicious people however they like. It may be downloaded, edited and shared in new forms, to offend, or cause distress, fear or embarrassment. Tech-savvy users may even hack into a userââ¬â¢s account and harass them. Due to the fact that one can totally hide their identity, individuals who may not be bullies in real world may be encouraged to take part in malicious activities as they can always cover up their identity. Cyber-bullying may take forms such as harassment, where one is sent offensive or frightening communications; flaming, involving engaging the victim in arguments that use offensive language; denigration, where one posts rumors and other false information to taint the
Sunday, November 17, 2019
Developing Early Warning System for Peace and Security in Nigeria Essay Example for Free
Developing Early Warning System for Peace and Security in Nigeria Essay 1. Brief Demographic Background of Nigeria: The demographic characteristics of Nigeria set the platform for an understanding of the case for conflict based National early warning system. A historical analysis of major conflicts in Nigeria since independence points to strong linkages to its demographic composition. It has been unarguably regarded as the most populous country in the Africa and also accounts for half of the entire population of West Africa. The last census exercise in 2007 conducted by the Nigeria Population Commision (NPC) put the countryââ¬â¢s population at over 140 million. (NPC, 2006). Politically, it practices a three tier federal system of government comprising the Federal, State and Local Government Councils which implies relative levels of autonomy in governance as well as oversight and control which many political analyst has attributed as a mixture of British Parliamentary and U.S Presidential system of governance. It has 36 states with a Federal Capital Territory at Abuja. These are further sub-divided into 774 semi-autonomous local government councils. For political and economic exigencies of governance and development, it is segregated into what is referred to as six geo political zones which include the North Central, North East, North West, South East, South South and South West. With over 240 ethnic groups spread across the country, the challenges of representation, equity in political representation as well as economic accessibility has been the bedrock of many diverse conflicts in the country. This is further complicated by the heterogeneous mixture of Christian and Muslim religion greatly polarised between the Christian south and Muslim Northern region. (op cit.)The population of traditional religion is sparsely located across the six geo-political zones of the country. Despite the immense rich natural resources in the country, crude oil located at the south south, south east and south west geo political zones of the country remain the major revenue source for the country and also the major source of various causative factors of conflict in Nigeria which has led to its reference in many social science research cycles as the ââ¬Ëresource curseââ¬â¢ to the extent that the country is now considered one of the 20 poorest countries in the world. Over 70% of the population is classified as poor, with 35 percent living in absolute poverty. This is especially severe in rural areas, where social services are limited or non existent. 2. The Peace and Security Dimension in Nigeria: In contrast, Nigeriaââ¬â¢s complex political, socio-cultural and economic diversity has been a source of varied and multiple levels of conflicts and humanitarian crises with implication to sustainable peace, security and development within the country and the West Africa sub region. A retrospection of these conflicts highlights six basic conflict types that have pervaded the country in the last two decades. These include communal conflicts, chieftaincy conflicts, ethno-religious conflicts, oil related conflicts, election related conflicts and agro-pastoralist conflicts. These conflicts are the outcome of the deep rooted causal factors of poverty, poor/bad governance and inequitable distribution of resources and development across the country. Between 1999 to 2010 for instance there has been an estimated death of 14,000 people from various levels of these conflicts across the country and about 750,000 ââ¬â 850,000 Internally displaced persons.(Internal Displacement Monitoring, 2007) Based on the lack of mechanisms to address the root cause of these conflicts, it has continued to reoccur, intensify and impact negatively in Nigerian societies to the extent of creating viscious cycles of violence and complex humanitarian crises. Communities experiencing these conflicts have remained vulnerable and usually face the risks of further conflicts and distablity. Based on the recurrence of these conflicts,the communities have been tagged, ââ¬Ëflashpoints of conflictââ¬â¢, unusually disaggregated across geo political lines or constellations. 3. The concept of Early Warning for Peace and Security: Based on the negative impact of conflicts to development and human security, there is increasing paradigm shift from conflict resolution mechanisms regarded as reactive to conflict prevention mechanisms which is seen as more proactive and has the capacity to prevent or mitigate destructive conflict or humanitarian crises globally. As core element of conflict prevention, early warning has increasingly gained prominence, credibility and efficiency as a preventive mechanism and solution to conflicts in societies. By definition, Early Warning has been described as a process of communicating judgements about threats early enough for decision-makers to take action to deter whatever outcome is threatened; or failing that, to manage events in such a way that the worst consequences are mitigatedâ⬠(WANEP: 2008). Dmitrichev Andrei defined it as organizational procedure or mechanism for the structures and systemic collection and analysis of information, and the subsequent communication of results of this analysis to policy makers in a form that would be easily recognized and understood. The recognition and appreciation of the opportunities inherent in this system resulted in the first organised platform for the systematic development of the early warning system led by the Forum on Early Warning and Early Response (F.E.W.E.R.) in 1997 in response to the Rwandan genocide of 1994. It blossomed to become the largest global network of over thirty five (35) organisations across the world that catalysed the creation of the early warning and response networks in the Caucasus (led by EAWARN/Russian Academy of Sciences), Great Lakes Region of Africa (led by the Africa Peace Forum) and West Africa(led the West Africa Network for Peacebuilding) WANEP. Further impetus to the adoption and institutionalisation of the early warning system was boosted by the former Secretary General of the United Nations, Kofi Annan when he stated that, ââ¬Å"For the United Nations, there is no larger goal, no deeper commitment and no greater ambition than preventing armed conflict. The prevention of conflict begins and ends with the protection of human life and the promotion of human development. Ensuring human security is, in the broadest sense, the United Nationsââ¬â¢ cardinal mission. Genuine and lasting prevention is the means to achieve that mission. (Koffi Annan: 2001) This further gave rise to the UN Security Council Resolution 1624 of 2005 with the following core declarations: 1. Reaffirms the need to adopt a broad strategy of conflict prevention, which addresses the root causes of armed conflict and political social crises in a comprehensive manner, including by promoting sustainable development, poverty eradication, national reconciliation, good governance, democracy, gender equality, the rule of law and respect for and protection of human rights; 2. Recognises the need to strengthen the important role of the United Nations in the prevention of violent conflicts, and to develop effective partnerships between the Council and regional organisations, in particular the African Union and its sub regional organisations, in order to enable early responses to disputes and emerging crises; 3. Affirms the UN commitment in ââ¬Å"supporting regional and sub regional capacities for early warning to help them in working out appropriate mechanisms to enable prompt action in reaction to early warning indicators; 4. Recognises the important supporting roles played by civil society, men and women, in conflict prevention and the need to take into account all possible contributions from civil society; 5. Supporting regional and sub regional capacities for early warning to help them in working out appropriate mechanisms to enable prompt action in reaction to early warning indicators; 6. Promote coordination with regional conflict management machinery in Africa which provide the Security Council with additional reliable and timely information to facilitate rapid decision-making; 7. Strengthen the capacities of civil society groups, including womenââ¬â¢s groups, working to promote a culture of peace, and to mobilise donors to support these efforts (UN: 2005) 4. Developing Institutional Platform for conflict Early Warning System: Reflecting on WANEP-Nigeriaââ¬â¢s Experience: The participation and commitment of the West Africa Network for Peacebuilding (WANEP) to the FEWER platform strengthened its capacity and hands on skill for civil society based analysis and response mechanisms towards the prevention or mitigation of conflict especially within the great lake region following the post Sierra Leone and Liberian Conflicts of 90ââ¬â¢s. This deepened its regional expertise as the reference point for early warning system in the West Africa sub region and subsequently the network of choice for the Economic Community of West Africa States (ECOWAS) in the implementation of the regional based ECOWAS Early Warning and Response Network (ECOWARN). The system principally works through three basic components of reporting/data gathering, analysis and information dissemination utilised to facilitate response to issues of peace and security within the ECOWAS sub region. WANEP became the civil society partner with ECOWAS in the implementation ECOWARN since 2006. As part of the WANEP regional network, WANEP-Nigeria was mandated as the national civil society focal point to report into the online ECOWARN system. Its task was to provide weekly and daily reports to the incidence and situation reporting template as designed into the online system. This was to give ECOWARN an up to date civil society perspective of the peace and human security threats and opportunities in Nigeria. With the participation of Nigeria in this process came ominous challenges. 1. The first was the pressure from the focal points at Lagos secretariat of WANEP-Nigeria to deliver credible reports in relation to the size of Nigeria 2. With the size of Nigeria, the focal point concentrated in getting information from national newspapers, television and radio For the focal points who were staff of WANEP, it was included as part of their job responsibility. They relied on making phone calls to members of WANEP at the state levels for local or peculiar peace and security information that was not reported in the national media. However, these information were reluctantly or half-hazardly given and also cost intensive to the staff as they often bore liability for these calls. This challenge was partially cushioned when ECOWAS resolved to pay reporters communication allowance in 2007/2008. Inspite of this, the feedback from member organizations providing information at the state level was still half hazard and questionable. To redress this challenge, the program team at the national secretariat organized a brainstorm meeting to develop a framework for a workable national early warning system that not only ensures commitment of member organizations to support the system but also is both functional and cost effective. The first trial system was developed for the Nigeria 2007 elections. An Information, Communication and Technology (I.C.T.) consultant was engaged that worked directly with the program team to capture specific indicators to monitor election related conflicts in what was referred to as the ââ¬Ëelection barometerââ¬â¢. The cost of developing the barometer was wholly borne by the secretariat while the election monitoring was performed by staf f who volunteered to report into the system as an experiential learning process to enhance their understanding of the EW system. The experience motivated the secretariat to consciously plan for a conflict intervention proposal which includes an aspect of a sustainable/operational national early warning system. The submission and approval of the proposal by international partners led WANEP-Nigeria to develop the first locally designed and operated conflict focused National Early Warning system.
Friday, November 15, 2019
Albert Camus The Stranger Essay -- Stranger
Albert Camus' The Stranger What if the past has no meaning and the only point in time of our life that really matters is that point which is happening at present. To make matters worse, when life is over, the existence is also over; the hope of some sort of salvation from a God is pointless. Albert Camus illustrates this exact view in The Stranger. Camus feels that one exists only in the world physically and therefore the presence or absence of meaning in one's life is alone revealed through that event which he or she is experiencing at a particular moment. These thoughts are presented through Meursault, a man devoid of concern for social conventions found in the world in which he lives, and who finds his life deprived of physical pleasure--which he deems quite important--when unexpectedly put in prison.Ã The opening line of the novel sets the tone for Meursault's dispassion towards most things. The novel is introduced with the words: "Maman died today. Or yesterday maybe, I don't know" (3). Although the uncertainty originates with an ambiguous telegram, it seems that the tone alone could justify changing the meaning of the words 'I don't know' to 'I don't care.' In a sense, in the days following, he only goes through the motions of the vigil and then the funeral; the only emotion he expresses is joy when his bus takes him home and he is able to sleep. At one point, he looks back at the events of the past few days, realizes that he has to go to work, and notes: "that, really, nothing had changed" (24). Despite these reactions, there is evidence that Meursault did indeed love his mother, observed both in his defensive argument at the 'old people's' home as to why she was put there in the first place and in his recollections... ...has no comprehension of the objects in its existence--as he is unconcerned with the objects in his own life and finds meaning only within himself. Meursault does not care for objects in his world. He does not see the importance of certain words whose definitions attempt to explain human relationships either amongst themselves or their emotions in general. He does not follow 'conventional' social beliefs nor does he believe in God, nor salvation. Meursault however loves his life. It is a pure love derived from enjoying his existence on a day-to-day basis, rarely looking back and never looking forward. His love is not dependent on doing what society or some religion has deemed correct, but on what he feels he wants to do despite what most would consider common. Work Cited Camus, Albert. The Stranger. Trans. Matthew Ward. New York: Vintage International, 1989.
Tuesday, November 12, 2019
Medicaid Fraud
Medicaid Fraud HCS/545 July 9, 2012 Medicaid fraud comes in many forms. A provider who bills Medicaid for services that he or she does not provide is committing fraud. Overstating the level of care provided to patients and altering patient records to conceal the deception is fraud. Recipients also commit fraud by failing to report or misrepresenting income, household members, residence, or private health insurance. Facilities have also been known to commit Medicaid fraud through false billing.The Medicare and Medicaid fraud and abuse statute provides that an individual who knowingly and willfully offers, pays, solicits, or receives any remuneration in exchange for referring an individual for the furnishing of any item or service (or for the purchasing, leasing, ordering, or recommending of any good, facility, item, or service) paid for in whole or in part by Medicare or a state health care program (i. e. , Medicaid) shall be guilty of a felony; this is known as the ââ¬Å"anti-kickba ckâ⬠statute (Mackelvie, 2004).Medicaid fraud affects taxpayers, recipients, and health care organizations. Measures to reduce Medicaid fraud are necessary. Individuals, facilities, and providers commit Medicaid fraud in several ways. One of the most common ways providers commit fraud is billing for services never provided. For instance, a physician may bill Medicaid for x-rays or lab work that the patient never received. Another way is double billing. Double billing occurs when both Medicaid and a private health insurance are billed for the same services.Medicaid is secondary health insurance to private health insurance and should be billed only for the charges that the primary health insurance does not pay. A third way providers commit Medicaid fraud is billing for phantom visits; charging Medicaid for seeing a patient who has not been seen. Providers have committed Medicaid fraud by billing for unnecessary tests and billing for more expensive procedures when a limited or les s comprehensive procedure was performed. Facilities such as pharmacies commit fraud by substituting brand name drugs for generic drugs and billing Medicaid for the brand name drug.Still other facilities receive kickbacks and file false cost reports. Kickbacks involve receiving payments or services for referral of patients to other facilities or providers where the patient will receive unnecessary services to generate additional income. False cost reports are seen in nursing home cases of fraud and involve owners filing charges for their own personal expenses. Individuals enrolled in Medicaid programs commit fraud by hiding resources, assets, and income.They also commit fraud by denying spouses live in their households or failing to report marriage to continue receiving Medicaid benefits. Individuals with private health insurance who fail to report this insurance and continue using Medicaid benefits are committing fraud. It is an abuse of the Medicaid program when individuals who cou ld obtain coverage on their own instead enroll in Medicaid to cover their medical expenses. Also the federal government stipulates that an individual cannot receive Medicaid in more than one state at the same time.Often, individuals move to another state and fail to report or close their Medicaid benefits with the state in which they were residing. Some individuals want to maintain coverage in more than one state because benefits differ from state to state and some individuals will travel between neighboring states using their Medicaid benefits. This constitutes Medicaid fraud. A program to fight Medicaid fraud has cost the United States at least $102 million in auditing fees since 2008 while identifying less than $20 million in overpayments, investigators found (Wayne, 2012).According to the National Association of Medicaid Fraud Control Units (2012), Medicaid provider fraud costs American taxpayers hundreds of millions of dollars annually and hinders the very integrity of the Medi caid program. Medicaid fraud affects recipients, providers, health care facilities, and taxpayers. Fraud increases the costs of providing benefits to Medicaid recipients. To compensate for such fraud, states must either raise taxes or decrease services in other areas. Those who most need Medicaid services may not be able to obtain benefits because resources are not available.For patients, Medicaid fraud could mean tampering with their medical records, which could put their health at risk. People can get hurt when doctors or other providers give less or more care than needed just to make more money. Also the public is more skeptical about social service programs as more incidents of Medicaid fraud occur every day. Providers and facilities who commit Medicaid fraud can face penalties from state and federal governments. Federal or state authorities may investigate allegations of fraud depending on where the fraud was reported, the laws broken, and the amount of money involved.The stric tness of penalties levied by state governments varies from state to state. Federal laws such as The False Claims Act, Anti-Kickback Statute, and Social Security Act are laws that address fraud and abuse. Title XI of the Social Security Act contains Medicaid program-related anti-fraud provisions, which impose civil penalties, criminal penalties, and exclusions from federal health care programs on persons who engage in certain types of misconduct (Staman, 2010).Under federal regulations, providers convicted of fraud are excluded for a minimum of five years from receiving funds from any federally funded health care program, either as a health care provider or employee (National Association of Medicaid Fraud Control Units, 2012). The False Claims Act imposes penalties on anyone who knowingly submits false claims for payment through a governmental program. Penalty for conviction under this Act is a fine not exceeding $10,000 or an imprisonment of up to five years, or a combination of the two (Centers for Medicare and Medicaid, 2011).The Anti-Kickback Statute makes it a criminal offense to knowingly and willfully offer, pay, solicit, or receive any remuneration to induce or reward referrals of items or services reimbursable by a Federal health care program (Centers for Medicare and Medicaid, 2011). Violations of this law are punishable by up to five years in prison, criminal fines up to $25,000, administrative civil money penalties up to $50,000, and exclusion from participation in federal health care programs (Centers for Medicare and Medicaid, 2011). There are other federal laws to address fraud and abuse of government programs such as Medicaid.These penalties are a reactive measure to control abuse of Medicaid, but proactive measurements are needed to discourage providers, individuals, and facilities from committing fraud. On October 27, 1977, President Jimmy Carter signed the legislation that provided each state with the opportunity and resources to establish a Medicaid Fraud Control Unit (MFCU) to investigate and prosecute provider fraud (National Association of Medicaid Fraud Control Units, 2012). The MFCU investigates Medicaid provider fraud and misuse of Medicaid recipientsââ¬â¢ funds.The jurisdiction of the Medicaid Fraud Control Units is limited to investigating and prosecuting Medicaid provider fraud, MFCUââ¬â¢s do not investigate recipient fraud. States must also take initiatives to curtail fraud. Many states are looking to use new technology as a means to prevent fraud. One such technology is biometrics. Biometric technology compares a userââ¬â¢s feature such as a fingerprint. This technology has the potential to prevent recipient fraud by eliminating card sharing as well as preventing provider fraud by reducing phantom billing and other forms of fraud.New York, for example, has integrated targeted data mining and risk analysis into its fraud-fighting tool box. In Texas, a few simple process changes and new pattern analys is and recognition efforts moved the state closer to ââ¬Ërealââ¬âtime analysisââ¬â¢ and significantly increased the amount of fraud identified (National Conference of State Legislators, 2012). States must develop continually ways to prevent Medicaid fraud and protect the resources provided for recipients. Controlling Medicaid fraud will be a continual task.The burden falls not on just the federal government, but also state governments, facilities, providers, recipients, and citizens. States should fully commit to working with federal policymakers and agencies to improve the integrity of the Medicaid program. Clarity is needed to define federal and state government roles in maintaining integrity of the Medicaid program. Collaboration and communication between Medicaid and Medicare is needed to reduce fraud. States should evaluate the utility of existing tools used to fight Medicaid fraud. Incentives for providers, recipients, and citizens to report suspected fraud must be m ade available.Abuse of Medicaid affects everyone and costs will continue to rise if measures are not taken to use better the resources available in the Medicaid program. References National Association of Medicaid Fraud Control Units. (2012). What is Medicaid Fraud?. Retrieved from http://www. namfcu. net/about-us/what-is-medicaid-fraud Mackelvie, C. F. (2004). ââ¬Å"The impact of fraud and abuse regulations ââ¬â Medicare and Medicaid fraud and abuse statutes. Retrieved from http://findarticles. com/p/articles/mi_m3257/is_n10_v46/ai_13413481/pg_6/? tag=content;col1 Wayne, A. (2012). Medicaid Fraud Audits Cost Five Times Amount U. S. Found. Retrieved from
Subscribe to:
Posts (Atom)