• Title/Summary/Keyword: 피해금액

Search Result 86, Processing Time 0.031 seconds

금융사고 실태 조사

  • Lee, Sang-Kyung
    • Journal of the Korea society of information convergence
    • /
    • v.7 no.1
    • /
    • pp.25-46
    • /
    • 2014
  • After examining the current situations of financial frauds and the reasons for their occurrence in the financial institutions through examples of financial frauds in domestic and abroad, this study presents ways to prevent such financial scams. The preventive measures consist of activities before and after the occurrence of financial frauds and during normal financial operations. The activities are as follows: 1. Preventive activity should be strengthened before the occurrence of financial frauds. That is, first, the enforcement of consistent internal control is needed. Second, in order to block the probability of financial frauds involved with employees, ethics education and a reward program for inside tippers need to be run. Third, financial institutions need to apply for comprehensive insurance policy to minimize the lost in case. 2. Preventive activity should be strengthened during normal financial operations. First, self authentication system for customers needs to be introduced. Second, dealings of day, week, and month need to be thoroughly checked and the system of audit needs to be expanded. Third, message service for the information on financial frauds and their preventive measures needs to be expanded. Fourth, public notification system against examples of financial frauds needs to be expanded. 3. Preventive activity after the occurrence of financial frauds should be strengthened. First, awareness for preventive measures such as imposing penalty on the manager needs to be enhanced. Second, strict restrictions on financial frauders such as a criminal charge needs to be strengthened. Third, there should be legal devices and resolutions in order to retrieve all the money deceived by financial frauds.

  • PDF

Risk Analysis for Cut Slope using Probabilistic Index of Landslide (사면파괴 가능성 지수를 이용한 절취사면 위험도 분석)

  • Jang, Hyun-Shic;Oh, Chan-Sung;Jang, Bo-An
    • The Journal of Engineering Geology
    • /
    • v.17 no.2 s.52
    • /
    • pp.163-176
    • /
    • 2007
  • Landslides which is one of the major natural hazard is defined as a mass movement of weathered material rock and debris due to gravity and can be triggered by complex mechanism. It causes enormous property damages and losses of human lift directly and indirectly. In order to mitigate landslide risk effectively, a new method is required to develope for better understanding of landslide risk based on the damaged cost produce, investment priority data, etc. In this study, we suggest a new evaluation method for slope stability using risk analysis. 30 slopes including 10 stable slopes, 10 slopes of possible failure and 10 failed slopes along the national and local roads are examined. Risk analysis comprises the hazard analysis and the consequence analysis. Risk scores evaluated by risk analysis show very clear boundaries for each category and are the highest for the failed slopes and the lowest for the stable slopes. The evaluation method for slope stability suggested by this research may define the condition and stability of slope more clearly than other methods suggested by others.

Transition and prospect of quantitative indexes for integrated water management (통합물관리 정량지표의 변천과 전망)

  • Jae Sung Jung;Jin Keun Song
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.441-441
    • /
    • 2023
  • 통합물관리는 2000년 이전부터 필요성이 논의되다가 2019년 물관리기본법이 제정·시행되면서 수량, 수질, 수생태, 방재 등 분야의 물관리 통합이 단계적으로 추진되고 있다. 수자원장기종합계획, 물환경관리 기본계획, 국가물관리기본계획, 4대강별 유역물관리종합계획 등이 수립되거나 수립중에 있다. 2021년 6월에 수립된 국가물관리기본계획에서는 통합물관리 정량지표들을 물환경, 물이용, 물안전, 물산업, 거버넌스의 5개 분야로 구분하여 제시하였고, 4대강 유역물관리종합계획(안)에서는 국가기본계획의 지표들을 근간으로 유역별 특성을 고려한 정량지표를 설정하고 있다. 수자원장기종합계획부터 유역물관리종합계획까지 통합물관리 정량지표들의 변천 내용과 현황을 검토하였다. 수자원장기종합계획(2016~2020)의 전략과 목표는 "①맑은 물 공급: 급수보급율, 관망 복선화율, 댐 부족량 공급기준, 비상급수 피해인구, 스마트시티 음용률, 누수율 저감, 물 기본법 제정, ②홍수안전 기반구축: 하천기본계획, 하천정비, 수해금액, 도시하천 종합치수대책 수립, 국가하천 홍수예보 지점, 홍수예보시간 단축지점 비율, ③친수환경 조성: 하천유지유량, 하천 이용객, 어류종 및 철새종 증가, ④수자원산업 및 기술개발: 일자리, 수자원산업 육성제도, 해외수주액, 외국 MOU, 국제회의, 남북공유하천 협의"이었다. 물환경관리 기본계획(2016~2025)의 전략과 목표는 "①물순환 체계: 불투수면적률 25% 초과지역, ②깨끗한 물 확보: 상수원 수질달성, ③생태계 서비스 증진: 수생태계 건강성 달성, ④물환경 기반 조성: 산업폐수 유해물질 배출저감, 상수원 4대강 보의 총인 농도와 남조류 세포수, ⑤경제·문화적 가치 창출: 국민체감 만족도"이었다. 국가물관리기본계획에서는 "①물환경: 하천·호소 목표수질 달성률, 수생태계 건강성 B등급 이상 비율, ②물이용: 수돗물 만족률-직·간접 음용률, 노후 상수관로-하수관로 개량, ③물안전: 가뭄피해 인구, 홍수피해 인구-피해액, 댐안전성 강화율, ④물산업: 물관리 R&D 예산, 수량·수질·수생태 통합측정 중권역 비율, 물산업 매출액의 수출액 비중, 한국 주도 국제협력 의제, ⑤거버넌스: 미정"을 계획지표로 하였다. 유역종합계획에서는 4대강별로 거버넌스를 포함하여, "①물환경: 국가계획지표, 주요 상수원 수질, ②물이용: 노후 상하수관로 개량, 지방상수도 유수율, ③물안전: 한해 인구, 수해 인구-피해액, 하천정비율, ④물산업: 물산업 일자리 창출, ⑤거버넌스: 물포럼, 시민참여활동"을 정량지표로 고려하고 있다.

  • PDF

AdvanSSD-Insider: Performance Improvement of SSD-Insider using BloomFilter with Optimization (블룸 필터와 최적화를 이용한 SSD-Insider 알고리즘의 탐지 성능 향상)

  • Kim, JeongHyeon;Jung, ChangHoon;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.5
    • /
    • pp.7-19
    • /
    • 2019
  • Ransomware is a malicious program that requires the cost of decryption after encrypting files on the user's desktop. Since the frequency and the financial damage of ransomware attacks are increasing each year, ransomware prevention, detection and recovery system are needed. Baek et al. proposed SSD-Insider, an algorithm for detecting ransomware within SSD. In this paper, we propose an AdvanSSD-Insider algorithm that substitutes a hash table used for the overwriting check with a bloom filter in the SSD-Insider. Experimental results show that the AdvanSSD-Insider algorithm reduces memory usage by up to 90% and execution time by up to 77% compared to the SSD-Insider algorithm and achieves the same detection accuracy. In addition, the AdvanSSD-Insider algorithm can monitor 10 times longer than the SSD-Insider algorithm in same memory condition. As a result, detection accuracy is increased for some ransomware which was difficult to detect using previous algorithm.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Development of the Performance Indicator for the Mitigation of Greenhouse Gas Emissions from Products - Estimation of Social Cost for Global Warming Impact using the Conjoint Analysis - (제품의 온실가스 배출저감에 대한 성과지표 개발 - 컨조인트 분석(conjoint analysis)을 이용한 지구온난화 영향의 사회적 비용 추정 -)

  • Jeong, In-Tae;Lee, Kun-Mo;Song, Jong-Sung
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.30 no.12
    • /
    • pp.1245-1254
    • /
    • 2008
  • Proposing a method for the estimation of the social cost for global warming impact (external cost) is the aim of this paper. Both the endpoint approach and conjoint analysis were applied to estimating the social cost for global warming. The endpoint approach was used to assess the damage on the safeguard subjects by global warming due to the emission of greenhouse gases into the atmosphere. The conjoint analysis was used to estimate the economic values for safeguard subjects which measure the social preferences and willingness to pay (WTP) on safeguard subjects. The economic values of human health and social asset were estimated at 62,261,700 Won / DALY (yr) and 10,000 Won / 10,000 Won, respectively. Moreover, cost factors of GHGs were calculated by multiplying the damage factor which is quantified the unit damage on safeguard subject and the economic value. In the case of CO$_2$, the cost factor was calculated at 13.52 Won / kg (13,520 Won / ton). External cost of products or services can be calculated by multiplying the GHG inventory result of products or services by the cost factor of each GHG. inventory.

Conclusion of Conventions on Compensation for Damage Caused by Aircraft in Flight to Third Parties (항공운항 시 제3자 피해 배상 관련 협약 채택 -그 혁신적 내용과 배경 고찰-)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.35-58
    • /
    • 2009
  • A treaty that governs the compensation on damage caused by aircraft to the third parties on surface was first adopted in Rome in 1933, but without support from the international aviation community it was replaced by another convention adopted again in Rome in 1952. Despite the increase of the compensation amount and some improvements to the old version, the Rome Convention 1952 with 49 State parties as of today is not considered universally accepted. Neither is the Montreal Protocol 1978 amending the Rome Convention 1952, with only 12 State parties excluding major aviation powers like USA, Japan, UK, and Germany. Consequently, it is mostly the local laws that apply to the compensation case of surface damage caused by the aircraft, contrary to the intention of those countries and people who involved themselves in the drafting of the early conventions on surface damage. The terrorist attacks 9/11 proved that even the strongest power in the world like the USA cannot with ease bear all the damages done to the third parties by the terrorist acts involving aircraft. Accordingly as a matter of urgency, the International Civil Aviation Organization(ICAO) picked up the matter and have it considered among member States for a few years through its Legal Committee before proposing for adoption as a new treaty in the Diplomatic Conference held in Montreal, Canada 20 April to 2 May 2009. Accordingly, two treaties based on the drafts of the Legal Committee were adopted in Montreal by consensus, one on the compensation for general risk damage caused by aircraft, the other one on compensation for damage from acts of unlawful interference involving aircraft. Both Conventions improved the old Convention/Protocol in many aspects. Deleting 'surface' in defining the damage to the third parties in the title and contents of the Conventions is the first improvement because the third party damage is not necessarily limited to surface on the soil and sea of the Earth. Thus Mid-air collision is now the new scope of application. Increasing compensation limit in big gallop is another improvement, so is the inclusion of the mental injury accompanied by bodily injury as the damage to be compensated. In fact, jurisprudence in recent years for cases of passengers in aircraft accident holds aircraft operators to be liable to such mental injuries. However, "Terror Convention" involving unlawful interference of aircraft has some unique provisions of innovation and others. While establishing the International Civil Aviation Compensation Fund to supplement, when necessary, the damages that exceed the limit to be covered by aircraft operators through insurance taking is an innovation, leaving the fate of the Convention to a State Party, implying in fact the USA, is harming its universality. Furthermore, taking into account the fact that the damage incurred by the terrorist acts, where ever it takes place targeting whichever sector or industry, are the domain of the State responsibility, imposing the burden of compensation resulting from terrorist acts in the air industry on the aircraft operators and passengers/shippers is a source of serious concern for the prospect of the Convention. This is more so when the risks of terrorist acts normally aimed at a few countries because of current international political situation are spread out to many innocent countries without quid pro quo.

  • PDF

A Study on the Effective Countermeasure of Business Email Compromise (BEC) Attack by AI (AI를 통한 BEC (Business Email Compromise) 공격의 효과적인 대응방안 연구)

  • Lee, Dokyung;Jang, Gunsoo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.835-846
    • /
    • 2020
  • BEC (Business Email Compromise) attacks are frequently occurring by impersonating accounts or management through e-mail and stealing money or sensitive information. This type of attack accounts for the largest portion of the recent trade fraud, and the FBI estimates that the estimated amount of damage in 2019 is about $17 billion. However, if you look at the response status of the companies compared to this, it relies on the traditional SPAM blocking system, so it is virtually defenseless against the BEC attacks that social engineering predominates. To this end, we will analyze the types and methods of BEC accidents and propose ways to effectively counter BEC attacks by companies through AI(Artificial Intelligence).

A Study on a Strategy to Enhance the Transparency of the Bidding and Contract System for Public Construction Projects (공공건설사업 입찰 및 계약제도측면의 투명성 확보 전략에 관한 연구)

  • Cho, Young-Jun;Kim, Jong-Ouk
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.6
    • /
    • pp.109-116
    • /
    • 2010
  • A construction project consists of many types of contracts. In the process of selecting the successful contractor after bidding, there will inevitably be fierce competition, which may lead to corruption or bribery. Even after signing the contract, during the period of settling the amount of the contract, bribery could occur. Such corruption could harm the development of the construction industry. It is, therefore, necessary to establish a strategy to prevent corruption by strengthening the transparency of the bidding process. In this study, to prevent corruption in the construction industry, a new service is proposed in which the successful bidder is selected by a professional third party, and the introduction of diverse delivery systems for construction projects and the invigoration of alternative methods of settling disputes are also proposed in this study.

A Study on Punitive Damages System in Technology Protection Related Laws: Focusing on Patent Act, TSPA, ITPA, FTSA, MBCA (기술보호 관련 법률에서의 징벌적 손해배상제도에 대한 고찰: 특허법, 영업비밀보호법, 산업기술보호법, 하도급법, 상생협력법을 중심으로)

  • Cho, Yongsun
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.19-41
    • /
    • 2020
  • In Korea, punitive damages were introduced in the 2011 Fair Transactions in Subcontracting Act(FTSA), and in 2019 the Patent Act, Trade Secret Protection Act(TSPA), Industrial Technology Protection Act(ITPA), and Mutually Beneficial Cooperation Act(MBCA). In punitive damages, the judgment of 'intentional' is especially important, and it is necessary to refer to US precedents since there is no accumulated case. Major Company can avoid intentional counseling through the advice of lawyers, but SMEs may have to punish punitive damages due to a lack of awareness of the system. In the case of TSPA, ITPA, FTSA, and MBCA, except for Patent Act, the provisions related to proof of damage have not been well maintained yet. Therefore, the data submission order system of these laws needs to be revised to the level of patent Act need to be. TSPA needs to be amended in the future to estimate the amount of the royalties in estimating the amount of damages so that it can receive the 'reasonably' estimated amount rather than the usual amount. On the other hand, ITPA, FTSA, and MBCA do not have any provisions for the estimation of damages. Besides, it is difficult to evaluate the technology value in the case of leakage or deodorization of new technologies. Therefore, valuation needs to be carried out by a credible institution along with the development of a model for calculating damages.