• Title/Summary/Keyword: Fraud

Search Result 443, Processing Time 0.024 seconds

Exploring the Challenges and Strategies for Combating Advertising Fraud and Preserving Brand Reputation in the Korean Advertising Landscape

  • Seung-Chul Yoo;Yoontaek Sung
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.306-311
    • /
    • 2023
  • As digital advertising continues to dominate the advertising industry and experience substantial growth, associated criminal activities such as advertising fraud and brand safety risks have become increasingly prevalent. Despite the severity and extent of these crimes, the response in Korea has been lackluster, often perceiving them merely as losses in advertising expenses incurred by corporations. However, it is important to note that these issues have direct repercussions on the end-consumer in the form of increased prices for goods and services. Furthermore, illegal and intrusive advertisements not only cause inconvenience to the viewer, but may also indiscriminately target cognitively vulnerable groups, such as children and the elderly, with the intention of manipulating advertising metrics and artificially inflating performance indicators. In this study, we aim to explore the concept and significance of advertising fraud and brand safety, and to evaluate the current measures taken in the Korean market. Additionally, we will delve into the implications of related policies and emphasize the necessity of digital advertising literacy in addressing these issues.

A Study on SIP Fraud Call Attack Method and Protect Base on Gateway (Gateway 방식에서 SIP Fraud Call 공격기법 관한 연구)

  • Yang, Jong-Sung;Choi, Hyoung-Kee;Jang, Hak-Beom;Kang, Sung-Yong;Gum, Ki-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.858-861
    • /
    • 2011
  • 최근 VoIP 서비스는 IP 네트워크의 안정화를 기반으로 국내 기업 Legacy PSTN 시장을 빠르게 대체해 가고 있다. 그러나 VoIP 서비스는 기존 인터넷망에서 발생 할 수 있는 보안 취약성 뿐 아니라 인터넷 전화 트래픽의 통과 문제 및 VoIP 스팸이나 도청 같은 기존에 없었던 새로운 이슈들을 발생 시키고 있다. 특히 SIP 인증 취약점을 이용한 Fraud Call 공격은 VoIP 서비스 사용자로 하여금 원하지 않은 호 및 과금을 대량 발생 시키는 공격기법으로 최근 기업의 피해사례가 늘어 나고 있다. 본 논문은 Fraud Call의 공격 기법을 분석하고, 호 인증 측면에서의 보안적 대응방안을 기술하고자 한다.

A Study on Unconscionability as an Exception to the Independence Principle under Bank Guarantees (은행보증의 독립성 예외와 "비양심성"에 관한 연구)

  • Jing-Ik Chae
    • Korea Trade Review
    • /
    • v.47 no.5
    • /
    • pp.115-128
    • /
    • 2022
  • This paper reviewed "unconscionability" as an exception to the independence principle of bank guarantees. Apart from fraud which has been recognized in most international jurisdictions, Uuconscionability would also be recognized as the exception to the legal principle, the so-called "fraud rule" or "an abuse of rights." Unconscionability exception is applied in the same manner as fraud and other exceptions to the principle of independence. The exception should allow guarantor to dishonor the drawings that abuse the independence principle. However, outright or manifest facts of the unconscionability must be established in order to apply the exception. Lots of arguments or conflicts may be caused in applying the unconscionability exception. Therefore, this study aims to prevent institutional abuses or to reduce the disputes from setting up the legitimate scope and standard for application of the exception by reviewing these procedural issues and problems under bank guarantee transactions. This paper also suggested practical implications and countermeasures for the institutional application.

Predictive Analysis of Financial Fraud Detection using Azure and Spark ML

  • Priyanka Purushu;Niklas Melcher;Bhagyashree Bhagwat;Jongwook Woo
    • Asia pacific journal of information systems
    • /
    • v.28 no.4
    • /
    • pp.308-319
    • /
    • 2018
  • This paper aims at providing valuable insights on Financial Fraud Detection on a mobile money transactional activity. We have predicted and classified the transaction as normal or fraud with a small sample and massive data set using Azure and Spark ML, which are traditional systems and Big Data respectively. Experimenting with sample dataset in Azure, we found that the Decision Forest model is the most accurate to proceed in terms of the recall value. For the massive data set using Spark ML, it is found that the Random Forest classifier algorithm of the classification model proves to be the best algorithm. It is presented that the Spark cluster gets much faster to build and evaluate models as adding more servers to the cluster with the same accuracy, which proves that the large scale data set can be predictable using Big Data platform. Finally, we reached a recall score with 0.73, which implies a satisfying prediction quality in predicting fraudulent transactions.

Fraud Click Identification Using Fingerprinting Method (핑거프린팅 기법을 이용한 부정 클릭의 식별)

  • Hong, Young-Ran;Kim, Dong-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.159-168
    • /
    • 2011
  • To identify fraud clicks in the Internet advertisement, existing studies have considered keyword, visit time, and client IP as an independent variable for the standard. These methods have limitations in identifying the fraud clicks that utilize automation tools, for they are methods based on client IP and human activities on the Internet. This paper proposes that fingerprinting values of the variable combination should be used to identify fraud clicks. The proposed model is composed of 3 stages and the fingerprinting values are compared with the other input data at each stage; IP fingerprinting in the first stage, IP and session data fingerprinting in the second stage, and session data and keyword fingerprinting in the third stage. We showed that the proposed model of the fraud click identification is more correct than existing methods through experiments according to the proposed scheme.

A Study on the Trends for Reforming Insurance Law in England - Focused on the Remedies for Fraudulent Claim - (영국 보험법의 개혁동향에 관한 연구 - 사기적인 보험금청구에 대한 구제수단을 중심으로 -)

  • SHIN, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.67
    • /
    • pp.119-142
    • /
    • 2015
  • Many insurers have traditionally incorporated "fraud clauses" into insurance policies, setting out the consequences of making a fraudulent claim. Even in the absence of an express terms, English courts provide insurers with a remedy for a fraudulent claim. However, the law in this area is complex, convoluted and confused. English Law Commission think that the law in this area needs to be reformed for three reasons; (1) the disjunctive between the common law rule and section 17 generates unnecessary disputes and litigation, (2) increasingly, UK commercial law must be justified to an international insurance society, and (3) the rules on fraudulent claims are functioned as a deterrent if they are clear and well-understood. In order for these purposes, English Law Commission recommends a statutory regime to the effect that, when an insured commits fraud in relation to a claim, the insurer should (1) have no liability to pay the fraudulent claim and be able to recover any sums already paid in respect to the claim, and (2) have the option to treat the contract as having been terminated with from the time of the fraudulent act and, if chosen the option, be entitled to refuse all claims arising after the fraud, but (3) remain liable for legitimate losses before the fraudulent act. LC is not recommending a complete restatement of the law on insurance fraud generally. For example, LC does not seek to define fraud, instead, recommends the introduction of targeted provisions to confirm the remedies available to an insurer who discovers a fraud by a policyholder.

  • PDF

Detecting Credit Loan Fraud Based on Individual-Level Utility (개인별 유틸리티에 기반한 신용 대출 사기 탐지)

  • Choi, Keunho;Kim, Gunwoo;Suh, Yongmoo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.79-95
    • /
    • 2012
  • As credit loan products significantly increase in most financial institutions, the number of fraudulent transactions is also growing rapidly. Therefore, to manage the financial risks successfully, the financial institutions should reinforce the qualifications for a loan and augment the ability to detect a credit loan fraud proactively. In the process of building a classification model to detect credit loan frauds, utility from classification results (i.e., benefits from correct prediction and costs from incorrect prediction) is more important than the accuracy rate of classification. The objective of this paper is to propose a new approach to building a classification model for detecting credit loan fraud based on an individual-level utility. Experimental results show that the model comes up with higher utility than the fraud detection models which do not take into account the individual-level utility concept. Also, it is shown that the individual-level utility computed by the model is more accurate than the mean-level utility computed by other models, in both opportunity utility and cash flow perspectives. We provide diverse views on the experimental results from both perspectives.

The Applicable Standards for the Injunction in Letters of Credit Disputes (신용상거래분쟁(信用狀去來紛爭)에서의 법원의 Injunction 적용기준(適用基準))

  • Kim, Sang-Ho;Kim, Jong-Chil
    • Journal of Arbitration Studies
    • /
    • v.8 no.1
    • /
    • pp.323-352
    • /
    • 1998
  • Documentary letters of credit including standby letters of credit are governed by the independence or abstraction rule and the doctrine of strict compliance. Since the former rule requires the issuing bank to honor the drafts regardless of the defective performance of the underlying contract, the applicant(the customer) will be without a remedy if he is unable to make himself whole by litigation on the underlying contract. Therefore, the applicant is exposed to a risk much higher than in the commercial letters of credit. The Uniform Customs and Practice for Documentary Credit(UCP) has no provisions allowing legal relief for the applicant on the abuse of L/C by unscrupulous beneficiary, but UCC ${\S}5-114$ has provision allowing injunctive relief for the applicant. In this paper, I attempted to clarify certain standards of injunctive relief available for the customer in the credit. When there is fraud in the L/C transaction by any of the parties concerned, we must weigh the principle of independence or abstraction and the fraud rules. According to banking practice and judicial precedence, we need not keep the principle of independence and abstaction even in fraudulent transaction and the bona fide sufferer must be protected. The purpose of this paper is to review the studies of Fraud rule and the Injunction and to suggest the applicable standards for the Injunction therory under letters of credit. Specially this paper analysed the following ; (1) the guideline for the fraud (exception) rule to the autonomy principle, (2) the appilcable standards of the Injunction, and (3) the implications on parties concerned in letters of credit transaction. Conclusively, the Injunction should be granted if (1) there is clear proof of fraud (2) the fraud constitutes fraudulent abuse if the independent purpose of L/C (3) irreparble injury might follow if injunction is not granted or the recovery of damages would be seriously endangered.

  • PDF

A Qualitative Study on the Process of Juveniles' Steeping in Cyber Crime : Focused on Internet Fraud (청소년이 사이버범죄에 빠지는 과정 - 인터넷사기 중심으로 -)

  • Choi, Ok-Chai
    • Korean Journal of Social Welfare
    • /
    • v.56 no.4
    • /
    • pp.103-122
    • /
    • 2004
  • This study is aimed to examine the process of juveniles' steeping in cyber crime for finding out data which could be applied to prevent juveniles' cyber crime and to rehabilitate the juveniles related in cyber crime. Also, this study is designed focusing on the Grounded Theory method, and 5 probationees connected with internet fraud have been interviewed as participants for this study. For the juveniles who had been steeped in cyber crime, some findings according to the analysed data have been emerged in the context of social work intervention. First, interventions need to be focused on the improvement of social environment and juveniles' crooked thoughts to prevent juvenile's Internet fraud and to rehabilitate juveniles related with Internet fraud. Second, workers need to guide the juveniles who have been indecisive on the another crime into regretting their guilty attitude in depth. Third, the prevention of juveniles' Internet fraud needs to be conducted on the level of social movement, and social work practice centers need to grope concrete programs networked with correctional authorities for the social movement.

  • PDF

Development of the Financial Account Pre-screening System for Corporate Credit Evaluation (분식 적발을 위한 재무이상치 분석시스템 개발)

  • Roh, Tae-Hyup
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.41-57
    • /
    • 2009
  • Although financial information is a great influence upon determining of the group which use them, detection of management fraud and earning manipulation is a difficult task using normal audit procedures and corporate credit evaluation processes, due to the shortage of knowledge concerning the characteristics of management fraud, and the limitation of time and cost. These limitations suggest the need of systemic process for !he effective risk of earning manipulation for credit evaluators, external auditors, financial analysts, and regulators. Moot researches on management fraud have examined how various characteristics of the company's management features affect the occurrence of corporate fraud. This study examines financial characteristics of companies engaged in fraudulent financial reporting and suggests a model and system for detecting GAAP violations to improve reliability of accounting information and transparency of their management. Since the detection of management fraud has limited proven theory, this study used the detecting method of outlier(upper, and lower bound) financial ratio, as a real-field application. The strength of outlier detecting method is its use of easiness and understandability. In the suggested model, 14 variables of the 7 useful variable categories among the 76 financial ratio variables are examined through the distribution analysis as possible indicators of fraudulent financial statements accounts. The developed model from these variables show a 80.82% of hit ratio for the holdout sample. This model was developed as a financial outlier detecting system for a financial institution. External auditors, financial analysts, regulators, and other users of financial statements might use this model to pre-screen potential earnings manipulators in the credit evaluation system. Especially, this model will be helpful for the loan evaluators of financial institutes to decide more objective and effective credit ratings and to improve the quality of financial statements.