• 제목/요약/키워드: Financial fraud

검색결과 98건 처리시간 0.039초

The Current State and Legal Issues of Online Crimes Related to Children and Adolescents

  • Hyoung-ryul Kim
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • 제34권4호
    • /
    • pp.222-228
    • /
    • 2023
  • There are two categories of online crimes related to children and adolescents: those committed by adolescents and those committed against children and adolescents. While recent trends in criminal law show consensus on strengthening punishment in cases of crimes against children and adolescents, there are mixed stances in cases of juvenile delinquency. One perspective emphasizes strict punishment, whereas the other emphasizes dispositions aligned with human rights. While various forms of online crime share the commonality in that the main part of the criminal act occurs online, they can be categorized into three types: those seeking financial gain, those driven by sexual motives, and those engaged in bullying. Among these, crimes driven by sexual motives are the most serious. Second-hand trading fraud and conditional (sexual) meeting fraud fall under the category of seeking financial gain and occur frequently. Crimes driven by sexual motives include obscenity via telecommunication, filming with discrete cameras, child and adolescent sexual exploitation material, fake video distribution, and blackmail/coercion using intimate images/videos ("sextortion"). These crimes lead to various legal issues such as whether to view vulgar acronyms or body cams that teenagers frequently use as simple subcultures or crimes, what criteria should be applied to judge whether a recorded material induces sexual desire or shame, and at what stage sexual grooming becomes punishable. For example, sniping posts, KakaoTalk prisons, and chat room explosions are tricky issues, as they may or may not be punished depending on the case. Particular caution should be exercised against the indiscriminate application of a strict punishment-oriented approach to the juvenile justice system, which is being discussed in relation to online sexual offenses. In the punishment case of online crime, juvenile offenders with a high potential for future improvement and reform must be treated with special consideration.

지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법 (Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality)

  • 최석재;이중원;권오병
    • 지능정보연구
    • /
    • 제23권3호
    • /
    • pp.119-138
    • /
    • 2017
  • 최근 SNS는 개인의 의사소통뿐 아니라 마케팅의 중요한 채널로도 자리매김하고 있다. 그러나 사이버 범죄 역시 정보와 통신 기술의 발달에 따라 진화하여 불법 광고가 SNS에 다량으로 배포되고 있다. 그 결과 개인정보를 빼앗기거나 금전적인 손해가 빈번하게 일어난다. 본 연구에서는 SNS로 전달되는 홍보글인 비정형 데이터를 분석하여 어떤 글이 금융사기(예: 불법 대부업 및 불법 방문판매)와 관련된 글인지를 분석하는 방법론을 제안하였다. 불법 홍보글 학습 데이터를 만드는 과정과, 데이터의 특성을 고려하여 입력 데이터를 구성하는 방안, 그리고 판별 알고리즘의 선택과 추출할 정보 대상의 선정 등이 프레임워크의 주요 구성 요소이다. 본 연구의 방법은 실제로 모 지방자치단체의 금융사기 방지 프로그램의 파일럿 테스트에 활용되었으며, 실제 데이터를 가지고 분석한 결과 금융사기 글을 판정하는 정확도가 사람들에 의하여 판정하는 것이나 키워드 추출법(Term Frequency), MLE 등에 비하여 월등함을 검증하였다.

국제무역거래(國際貿易去來)에서의 신용상거래(信用狀去來) 사기사건(詐欺事件)의 대처방안(對處方案) (How to deal with Fraud Cases in L/C-based Transactions in International trade business)

  • 남선모
    • 한국중재학회지:중재연구
    • /
    • 제18권2호
    • /
    • pp.173-199
    • /
    • 2008
  • A letter of credit transaction of the preexistence have been raising one's head fraud charge problem as a result of abusing the principles of independence and abstraction. Every society has certain rules and conventions which it regards as important and most of people in any society. The paper document means a document in a traditional paper form. The eUCP credit must specify the formats in which electronic records are to be presented. In these present times, the issuance of documentary credit are performed by the SWIFT(Society for Worldwide Inter bank Financial Telecommunication) system. The eUCP have been written to allow for presentation completely electronically or for a mixture of paper documents and electronic presentation. Presentation is deemed not to have been made if the Beneficiary's notice is not received. An electronic record that cannot be authenticated is deemed not to have been presented. The e-UCP is the supplement of current existing UCP but is superior to UCP under some circumstances. The document shall include an electronic record. The place for presentation of electronic records means an electronic address. The current e-UCP is not clear on this matter. We have to note followings in case of presenting the documents electronically and applying the e-UCP. There are three principles in the letter of credit transaction, that is to say, independence and abstraction, document dealing, strict compliance. IN the electronic letter of credit, these principles are called as independence and abstraction, electronic document dealing, strict compliance.

  • PDF

미국(美國) 통일상법전(統一商法典)의 신용장규정(信用狀規定)과 신용장통일규칙적용상(信用狀統一規則適用上)의 주요(主要) 쟁점(爭點) (Issues on Application between Letters of Credit Provisions of the UCC and the UCP)

  • 강원진
    • 무역상무연구
    • /
    • 제12권
    • /
    • pp.405-427
    • /
    • 1999
  • Although Uniform Customs and practice for Documentary(UCP) is not a law, it applies to most documentary credits and is binding on all parties unless otherwise expressly stipulated. Besides, Uniform Commercial Code(UCC) Article 5 was codified by the United States and was adopted by every state. Moreover, the New York version of the UCC Article 5-102(4) specifically providing that the UCC does not apply to letters of credit where the parties agree to be governed by the UCP. Identical nonuniform Articles were latter added in Alabama, Arizona, and Missouri. The fact that courts in forty-six of the fifty states are bound by Article 5. Until now, Article 5 of the UCC has probably had an impact on the decisions in New York and the New York common law. Therefore, I examined a few issues on application between Article 5 of the UCC and the UCP. First, although the UCP attempt to introduce a new for examination of document by incorporating "standard practice of financial institutions" and "international banking practice", the standards for documentary compliance are not clear. The UCC attempt to rely on the matter of interpretation for the court, but the UCP would probably be interested in examining in about bank's internal practices as reflected in UCP Articles. Second, the rule for nondocumentary conditions is a useful for stand-by credit transactions under the UCC, but these conditions would probably put the bank in an even worse position in case of documentary credit transactions under the UCP. Third, the UCP does not contain any provision governing the fraud exception, but the UCC codified the fraud and forgery rules developed through American case law. Fourth, the UCP treats the issue of transfer in much more detail than the UCC does. In contract, the UCP's treatment of assignment of proceeds is brief. Finally, I suggest that the fraud exception rules should be prescribed in the UCP in order to protect the issuing bank and the applicant when an unscrupulous party attempts to defraud.

  • PDF

NFT 거래에 따른 사기범죄 유형 분석에 관한 연구 (A Study on the Analysis of Fraud Crime Types according to NFT Transactions)

  • 송혜진
    • 한국재난정보학회 논문집
    • /
    • 제19권4호
    • /
    • pp.908-915
    • /
    • 2023
  • 연구목적: 본 연구의 목적은 NFT 거래시 일어나고 있는 여러 가지 범죄들 중 사기범죄 유형을 살펴보고, 이에 대한 범죄유형 분석과 단속 방법 및 법적 한계로 인한 제도적 문제에 대해 접근해보고자 하기 위함이다. 연구방법: NFT 거래시 나타나는 사기범죄 유형을 분류하기 위해 선행연구 조사결과와 현재 발생하고 있는 사건사례 등을 통하여 범죄유형을 분석하였다. 연구결과: NFT를 통해 내 일어나고 있는 범죄는 대부분 러그풀, 도난사건, 개인정보 탈취사기, 돼지도살 등 여러 가지 사기범죄 유형들이 나타나고 있다. 따라서 이 유형들을 분류하였고 다양한 피해사례도 분석하였다. 저작권의 문제이다. 결론: 현재 전세계적으로 NFT의 사기범죄 발생으로 생기는 금적적 문제가 가장 우려되고 있으며 향후 시장이 커지면서 그 규모는 더욱 방대해질 것이다. 따라서 우리나라에서도 범죄예방 및 수사와 검거활동에 영향을 줄 수 있는 범죄유형 분석을 통해 다양한 제도적 보완과 정책이 마련되어야 할 것이다.

금융권 클라우드 도입 활성화를 위한 우선순위 과제 도출 연구 (A Study on Implementing a Priority Tasks for Invigoration of Cloud in Financial sector)

  • 박원효;장항배
    • Journal of Platform Technology
    • /
    • 제8권1호
    • /
    • pp.10-15
    • /
    • 2020
  • 언제 어디서나 손쉽게 데이터 저장·관리 및 활용·분석 등을 가능하게 하는 클라우드컴퓨팅 기술의 특성으로 공공·금융·의료 등 다양한 산업군에서 클라우드 서비스 도입이 활발히 이루어지고 있다. 특히 금융 산업은 선제적으로 클라우드 서비스를 도입하여 다양한 혁신 사례를 창출하고 있으며, 이미 해외 금융권에서는 신용리스크 분석, 금융사기 데이터 분석, 주식거래 분석 등 디지털화의 가속화를 진행하고 있다. 반면, 국내 금융권의 경우 클라우드 서비스 도입과 혁신 사례들이 저조할 뿐만 아니라 대부분 후선업무 서비스 부문에 초점이 맞춰져 있다. 데이터 저장과 관리에 대한 규제, 개인 정보 보호에 대한 규제 등 산재되어 있는 다양한 보수적인 규제 요건과 의사결정모형 개발, 보안사고 및 서비스 장애에 따른 책임소재기준 설정 등의 해결과제들로 많은 금융사들이 클라우드 서비스를 도입하는 것에 부담을 갖고 있는 상황이다. 이에 본 연구에서는 선제적 해결과제들을 도출하여 우선순위를 살펴봄으로써 국내 금융권 클라우드 도입 활성화에 기여하고자 한다.

  • PDF

온라인 거래에서 사고 발생시 누가 이의 입증책임을 질 것인가? (Who is responsible for the onus of proof on online fraud transactions? In perspectives of the eCommerce Law and Privacy Investment)

  • Chun, Se-Hak;Cho, Woo-Je;Kim, Jae-Cheol
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.699-704
    • /
    • 2007
  • In this study, we examine why there exist different legal systems in electronic commerce or online financial trading. When a fraud online transaction occurs and the online customer disputes the transaction, the online customer takes responsibility for the proof of her/his argument in many European countries while in the U.S., the burden of proof lays on the firm. This paper analyzes how these two different legal systems exist and how these can be applied to electronic commerce law. In particular, this paper intends to find the optimal level of e-commerce firms' investment on security and analyzes how security investments can be related to firm's profits and consumer's welfare depending on IT infrastructure and social trust environment. More on, this paper can be contributed to provide guidelines for regulatory framework on ecommerce online transactions and discuss social welfare implications.

  • PDF

전기 통신 금융사기에 영향을 미치는 요인에 관한 연구 : 전화 금융사기를 중심으로 (A Study on Factors Influencing Telecommunications Fraud : In the Case of Voice Phishing)

  • 조수현;이유우;최명길
    • 한국IT서비스학회지
    • /
    • 제15권2호
    • /
    • pp.35-49
    • /
    • 2016
  • With the gradual development of IT technology, voice phishing victims are increasing in number. In the past when only voice phone calls were made, personal information or financial information were stolen mainly by a direct phone call, but recently, as smart phones are widely in use, it is evolving into a way such as smishing that leads an access to a site with malicious codes spreading out. Since it is easy to run away after committing a crime, and trace are rarely left in case of voice phishing, it is difficult to find out criminal. In addition, it is most likely that a victim be would be exposed to further damage from another voice phishing. Its technique is growing in kinds and turning more intelligent day by day; Therefore, its victims are increasing in number. Previous researches mainly focused the area of legal studies while the factors exposed to voice phishing have not been made. Therefore, this study has analyzed the motifs in which voice phishing is done to draw out its outcomes as follows. First, a victim comes to trust the criminal by the factors of favorability, rare message, and mutuality. Second, the more sophisticated the technique of a criminal, the more likely a victim is exposed to voice phishing.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • 제12권2호
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

무역금융제도의 운용상 문제점과 그 개선방안에 관한 연구 (A Study on the Problems and Its Improvement Plans in Operation of Korean Trade Finance System)

  • 채진익
    • 무역학회지
    • /
    • 제44권6호
    • /
    • pp.39-54
    • /
    • 2019
  • Trade finance promotes export performance, and every small- and medium-sized export business has the right to use policy finance. The credit line is also stipulated by relevant laws and regulations. However, trade finance has repeatedly been misused, so these matters can lead to substantial financial loss and damage to the related financial institutions. The lack of expertise of K-SURE and the backwardness of banks represent even bigger problems in the follow-up management. The existing trade finance system should be improved in the following ways from the institutional and legal perspectives. Firstly, follow-up management of beneficiary companies should be reinforced and systematized through examining business tendencies, financial status, and other important factors. There is also a need for advancement of following up management. An effective and streamlined financing system must be established by abolishing the Korea Trade Insurance Corporation. This study presents improvements and their implications by looking into the main issues under the current trade finance system. This study is based on documentary research and practical cases.