• Title/Summary/Keyword: Financial Crime

Search Result 66, Processing Time 0.026 seconds

Effects that Faith Factor of Social Bonds Have on Cyber Bullying Phenomenon (사회유대의 신념요인이 사이버 불링 가해 현상에 미치는 영향)

  • Lee, Young-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.256-262
    • /
    • 2016
  • A cyber crime has been evolving, as other crimes have. Beyond physical damages such as financial crimes in the cyber world, it has evolved into psychological forms like cyber-bullying. In today's crimes, measures that consider psychological effects of crimes are highly regarded in that fear of crime is considered as well as visible crimes. Accordingly, cyber bullying, which causes psychological damages, needs to be treated very importantly. Because the characteristics of cyber crime is caused by different circumstances from the real world, measures should be taken in different aspects. Rather than physical damages, which can be found in the conventional crimes, cyber crimes cause psychological damages, so the effect that has on inflicting should be specified. Especially, in the environment that virtual reality is ubiquitous through smart phones, it is very difficult to establish measures by considering all the causes of general cyber crimes. Therefore, this study estimated what affects cyber bullying by focusing on personalized faith factor among social bond theory, which can control cyber crimes. As a result, self-controling faith was verified to have a negative effect on cyber bullying, so faith is a very important factor in personalized environment. Thus, it is suggested that the characteristics of cyber space and education of humanism, which can affect individuals' faith should be emphasized.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.

A Study on the Family Business as an Alternative for Women's Employment (여성취업의 대안으로서의 가족기업에 관한 고찰)

  • 정영금
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.11
    • /
    • pp.125-138
    • /
    • 1999
  • Women’s employment rate is decreasing and unemployment rate is increasing since we crime to financial crisis in Korea. So, many women are interested in the running their own business. But people have not recognized the business as a field of women and women have not been accustomed to nil the business. This study aims to introduce the family business as an alternative of women’s employment. This study examines the prospect about family business in Korea through the literature. For this purpose, definition and present state about family business in Korea, motive and background which women start or succeed the family business, advantages and disadvantages which women have when they run the family business, and methods for supporting woman entrepreneur are suggested. finally, some suggestions in educational field for enlarging the women’s roles and relative importance in family business are presented.

  • PDF

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

The Comparison on the Investigative Training between the Current Korean National Police and the Law Enforcement Agencies of U.S.A. and Germany (현 대한민국 경찰의 수사교육과 미국, 독일 수사기관과의 비교)

  • Kim, Dae-Sik;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.52-80
    • /
    • 2007
  • In the rapidly changing current society, the Korean National Police(KNP) is facing a lot of demands from the citizens like the protection of subject/victim rights, independence of investigation authority, disclosure of actual truth, and prevention & eradication of crimes. It is widely recognized among the Korean people and the police that the KNP is always standing for the rights of the people and it is high time that the KNP should be restored as the pioneer for the protection of human right. In this situation, the tremendous emphasis is given on the importance of investment in investigative training through the long-term master-plan in order to renovate its constitution, to level up its quality, and to cope with the highly sophisticated crime patterns. Korean police have already shown its outstanding investigative skills of identification of the deceased throughout large cases like Daegu subway arson and tsunami in Southeast Asia. In addition, the skills of cyber crime investigation are highly recognized by foreign law enforcement agencies. However, the investigative skills and abilities are being degraded and the morale of the investigative personnel are falling due to the insufficiently of the finite training budget. Lack of financial support results in the lack of training program and poor training environment, which subsequently leads to the inefficiency of training. Additionally, no long-term budget for fostering specialized investigative agents is allotted. Considering the fact that more than 95% of crimes in Korea are being primarily investigated by the Korean police, we have to understand the importance of the police. By the tremendous investment in investigative training which can lead to the high-quality investigations, the Korean police can ultimately contribute to the protection of safety and life of its people.

  • PDF

An Analysis of Insurance Crimes: The Case of Blackmail in Automobile Accidents (보험사기범죄에 대한 분석 고의 교통사고 유도 - 합의금 요구 사건을 중심으로)

  • Yang, Chae-Yeol
    • The Korean Journal of Financial Management
    • /
    • v.23 no.1
    • /
    • pp.227-242
    • /
    • 2006
  • This paper analyzes insurance crimes using a game theoretic model. In blackmailing cases involving automobile accidents, insurance criminals deliberately induce innocent drivers(victims) to commit a moving violation such as crossing over the center dividing yellow line, and collide with the victims. After the collision, the criminals and the victims effectively engage in a bargaining game over the amount of the settlement for the damage. Because the penalty for that kind of moving violation is very severe (even criminally prosecuted), the victims do not have much bargaining power. Exploiting the weak bargaining power of the victims, the criminals demand and receive huge compensation (including settlement) from the victims. In the model, it is shown that under the current law agents have perverse incentives leading to insurance crimes. The criminals have incentive to induce car collisions and extract huge settlement from the victims. Based on the analysis, it is suggested that lowering the severity of penalty for certain kind of violation may be needed to prevent insurance crimes, in addition to increasing the crime investigation activities and strengthening punishment for insurance criminals.

  • PDF

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

Forensic Analysis Technology of Smart phone backup data via synchronization (동기화 스마트폰 백업 데이터 포렌식 분석 기술)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.287-290
    • /
    • 2011
  • The synchronization feature on the smartphone by default (default) value is set. Smartphone synchronization has been set is stored that smartphone data is automatically backed up is stored When connected to a PC with a smartphone dedicated cable. The backup data is a common technique to analyze the content to be difficult to apply forensic techniques can find out information on criminal suspects. In this paper, the backup data is synchronized to the smartphone through forensic analysis is the study of forensic evidence. In a lab environment to send personal financial information on smartphone, smartphone is assumed that the experiment is compromised. Smartphone's backup data by using the forensic tools in crime associated with personal financial information and analyze data. And, to be adopted by the court will study the evidence leveraging forensic technology. Through this paper as a basis for smartphone forensic analysis will be utilized.

  • PDF

Identification of Voice Features for Recently Voice Fishing by Voice Analysis (음성 분석을 통한 최근 보이스피싱의 음성 특징 규명)

  • Lee, Bum Joo;Cho, Dong Uk;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1276-1283
    • /
    • 2016
  • The scale of financial damages on voice fishing has not been decreased despite of national and social efforts to reduce the amounts of voice fishing damage. One of these reasons is a sophisticated and vernacular speech style that makes it difficult to recognize the offenders. Furthermore, nowadays, young men have intensively been deceived by not only sophisticated and vernacular speech style which is used the employer of real public offices but also obtained personal information. As a result, this lead directly to the financial damages of younger people who has a stronger judgement than older. For this, we investigated the comparison and analysis between the criminals of voice fishing and the same generation younger people for identifying voice features. The experiment was carried out based on the pitch, bandwidth of pitch, energy, speech speed and voice color for searching the difference of voice characteristics between the criminals of voice fishing and the same generation younger people since 2011. The experimental result shows that there is a significant difference in energy and speech speed between the criminals of voice fishing and the same generation younger people.

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.