• Title/Summary/Keyword: Internal Fraud

Search Result 23, Processing Time 0.026 seconds

Human Resource Investment in Internal Control and Valuation Errors

  • Haeyoung Ryu
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.293-298
    • /
    • 2024
  • The purpose of an internal control system is to prevent the occurrence of errors and fraud in the process of producing accounting information, thereby providing investors with reliable information. For the effective operation of an internal control system, it is necessary to secure a sufficient number of personnel and experienced staff. This study focuses on the personnel directly involved in producing accounting information, examining whether companies that invest in their internal control staff experience a mitigation in the phenomenon of valuation errors. The analysis revealed that the size and experience months of the personnel responsible for internal control have a significant negative relationship with valuation errors. This result implies that by securing sufficient personnel for the smooth operation of the internal control system and placing experienced staff within the system, investors can effectively make judgments about the intrinsic value based on quality accounting information, thereby reducing valuation errors.

Corporate Social Responsibility in Modern Transnational Corporations

  • Vitalii Nahornyi;Alona Tiurina;Olha Ruban;Tetiana Khletytska;Vitalii Litvinov
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.172-180
    • /
    • 2024
  • Since the beginning of 2015, corporate social responsibility (CSR) models have been changing in connection with the trend towards the transition of joint value creation of corporate activities and consideration of stakeholders' interests. The purpose of the academic paper lies in empirically studying the current practice of social responsibility of transnational corporations (TNCs). The research methodology has combined the method of qualitative analysis, the method of cases of agricultural holdings in emerging markets within the framework of resource theory, institutional theory and stakeholders' theory. The results show that the practice of CSR is integrated into the strategy of sustainable development of TNCs, which determine the methods, techniques and forms of communication, as well as areas of stakeholders' responsibility. The internal practice of CSR is aimed at developing norms and standards of moral behaviour with stakeholders in order to maximize economic and social goals. Economic goals are focused not only on making a profit, but also on minimizing costs due to the potential risks of corruption, fraud, conflict of interest. The system of corporate social responsibility of modern TNCs is clearly regulated by internal documents that define the list of interested parties and stakeholders, their areas of responsibility, greatly simplifying the processes of cooperation and responsibility. As a result, corporations form their own internal institutional environment. Ethical norms help to avoid the risks of opportunistic behaviour of personnel, conflicts of interest, cases of bribery, corruption, and fraud. The theoretical value of the research lies in supplementing the theory of CSR in the context of the importance of a complex, systematic approach to integrating the theory of resources, institutional theory, theory of stakeholders in the development of strategies for sustainable development of TNCs, the practice of corporate governance and social responsibility.

Comparison of IT Security Risk Analysis and Internal Control Evaluation (정보시스템 보안을 위한 위험분석활동과 내부통제평가와의 비교)

  • Cho, Sungbaek;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.81-90
    • /
    • 2003
  • Risk analysis and internal control evaluation are key security management activities for securing organizational assets. Risk analysis is used to identify areas that need safeguarding while internal control evaluation is used to check whether the current control system is effective with a reasonable degree of assurance. Risk analysis usually focuses on unauthorised activities of unauthorised people and has not paid much attention to threats that could be committed by authorized users. As attention to fraud increases, these threats should be appropriately treated within organizations. This paper compares the difference between these two approaches.

  • PDF

Issues on Application between Letters of Credit Provisions of the UCC and the UCP (미국(美國) 통일상법전(統一商法典)의 신용장규정(信用狀規定)과 신용장통일규칙적용상(信用狀統一規則適用上)의 주요(主要) 쟁점(爭點))

  • Kang, Won-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.405-427
    • /
    • 1999
  • Although Uniform Customs and practice for Documentary(UCP) is not a law, it applies to most documentary credits and is binding on all parties unless otherwise expressly stipulated. Besides, Uniform Commercial Code(UCC) Article 5 was codified by the United States and was adopted by every state. Moreover, the New York version of the UCC Article 5-102(4) specifically providing that the UCC does not apply to letters of credit where the parties agree to be governed by the UCP. Identical nonuniform Articles were latter added in Alabama, Arizona, and Missouri. The fact that courts in forty-six of the fifty states are bound by Article 5. Until now, Article 5 of the UCC has probably had an impact on the decisions in New York and the New York common law. Therefore, I examined a few issues on application between Article 5 of the UCC and the UCP. First, although the UCP attempt to introduce a new for examination of document by incorporating "standard practice of financial institutions" and "international banking practice", the standards for documentary compliance are not clear. The UCC attempt to rely on the matter of interpretation for the court, but the UCP would probably be interested in examining in about bank's internal practices as reflected in UCP Articles. Second, the rule for nondocumentary conditions is a useful for stand-by credit transactions under the UCC, but these conditions would probably put the bank in an even worse position in case of documentary credit transactions under the UCP. Third, the UCP does not contain any provision governing the fraud exception, but the UCC codified the fraud and forgery rules developed through American case law. Fourth, the UCP treats the issue of transfer in much more detail than the UCC does. In contract, the UCP's treatment of assignment of proceeds is brief. Finally, I suggest that the fraud exception rules should be prescribed in the UCP in order to protect the issuing bank and the applicant when an unscrupulous party attempts to defraud.

  • PDF

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

The factors of SNS Characteristics and Organizational Culture Affecting Military Morale (SNS의 특성과 조직 커뮤니케이션 문화가 군의 사기에 미치는 요인)

  • Kang, Seoung-Yun;Yun, Seok-Yong;Han, Kyeong-seok
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.79-88
    • /
    • 2018
  • Previously, there have been many studies on the fraud of employees, internal customers of the company, but there have been a lot of studies on military affairs that are closely related to the improvement of army's combat power. Therefore, this study investigates how communication satisfaction is influenced by the characteristics of SNS. For empirical verification, 240 soldiers were surveyed in this study. The analysis method was to investigate the correlation between each variable using the Structural Equation Model (SEM). The results of this study show that the SNS characteristics have a positive effect on the overall model related to organizational communication satisfaction. Organizational communication satisfaction has a positive impact on military fraud and organizational communication satisfaction has been shown to mediate between army and SNS traits. Through this research, we intend to promote the morale of soldiers by activating communication among group members using appropriate level of social networking.

A Research on the Development of Information Security Governance Framework (정보보호 거버넌스 프레임워크 개발에 관한 연구)

  • Lee, Seong-Il;Hwang, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.2
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

The Impact of Internal Control on Accounting Information Systems Bying Path-analysis method (경로분석에 의한 내부통제가 회계정보시스템에 미친 효과분석)

  • Lee, Jang-Hyeong
    • Asia pacific journal of information systems
    • /
    • v.5 no.2
    • /
    • pp.79-100
    • /
    • 1995
  • Internal Control(IC) comprises the plan of organization and all of the coordinating methods and measures adopted in a business to safeguard its assets, check the accuracy and reliability of its accounting data, promote operational efficiency and encourage adherence to the prescribed managerial policies. If an organization's IC is not adequate, Accounting Information System (AIS) will be vulnerable to accomplish the organizations successes. Therefore, an effective and efficient IC is essential to its successes. The purpose of this study is to analyze the impact of EDP IC on the perceived usefulness of AIS. Do the general controls indirectively affect to the usefulness of AIS through th application controls? To solve these problems, a research model and a set of hypotheses were established and empirically tested. 60 financial institutions (banks, insurance companies, security companies) agreed to participate in the study. Data were gathered through structured interviews with 60 information systems managers and 537 users of accounting information of each company. Survey forms were designed and collected from financial institutions in Seoul. Information systems' managers of financial institutions responded to questionnaire(1) which consists of a series of 70 questions related to practice and perceived importance. Questionnaire (2) was received from 537 users, who responded to series of 17 questions related to the perceived usefulness. The results of analysis are summarized below. Effects of general controls are more direct on AIS's usefulness than those of application controls. Whereas, indirect effects of application controls are geater than those of general controls. Therefore, the greater the effects of application controls on general controls, the higher the perceived usefulness of AIS. In conclusion, this study supports that the perceived usefulness of AIS is affected by IC which are composed of general controls and application controls. The results of this study has significant implication to financial institution as computer fraud potential increases. Because of global competitions, financial institutions should restructure to IC and AIS in order to take advantage of the technological progress in Information System.

  • PDF

A Study on Procurement Audit Integration Real Time Monitoring System Using Process Mining Under Big Data Environment (빅 데이터 환경하에서 프로세스 마이닝을 이용한 구매 감사 통합 실시간 모니터링 시스템에 대한 연구)

  • Yoo, Young-Seok;Park, Han-Gyu;Back, Seung-Hoon;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.18 no.3
    • /
    • pp.71-83
    • /
    • 2017
  • In recent years, by utilizing the greatest strengths of process mining, the various research activities have been actively progressed to use auditing work of business organization. On the other hand, there is insufficient research on systematic and efficient analysis of massive data generated under big data environment using process mining, and proactive monitoring of risk management from audit side, which is one of important management activities of corporate organization. In this study, we intend to realize Hadoop-based internal audit integrated real-time monitoring system in order to detect the abnormal symptoms in prevent accidents in advance. Through the integrated real-time monitoring system for purchasing audit, we intend to realize strengthen the delivery management of purchasing materials ordered, reduce cost of purchase, manage competitive companies, prevent fraud, comply with regulations, and adhere to internal control accounting system. As a result, we can provide information that can be immediately executed due to enhanced purchase audit integrated real-time monitoring by analyzing data efficiently using process mining via Hadoop-based systems. From an integrated viewpoint, it is possible to manage the business status, by processing a large amount of work at a high speed faster than the continuous monitoring, the effectiveness of the quality improvement of the purchase audit and the innovation of the purchase process appears.

Molecular Identification of Korean Mountain Ginseng Using an Amplification Refractory Mutation System (ARMS)

  • In, Jun-Gyo;Kim, Min-Kyeoung;Lee, Ok-Ran;Kim, Yu-Jin;Lee, Beom-Soo;Kim, Se-Young;Kwon, Woo-Seang;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.34 no.1
    • /
    • pp.41-46
    • /
    • 2010
  • Expensive herbs such as ginseng are always a possible target for fraudulent labeling. New mountain ginseng strains have occasionally been found deep within mountain areas and commercially traded at exorbitant prices. However, until now, no scientific basis has existed to distinguish such ginseng from commonly cultivated ginseng species other than by virtue of being found within deep mountain areas. Polymerase chain reaction (PCR) analysis of the internal transcribed spacer has been shown to be an appropriate method for the identification of the most popular species (Panax ginseng) in the Panax ginseng genus. A single nucleotide polymorphism (SNP) has been identified between three newly found mountain ginseng (KGD4, KGD5, and KW1) and already established Panax species. Specific PCR primers were designed from this SNP site within the sequence data and used to detect the mountain ginseng strains via multiplex PCR. The established multiplex-PCR method for the simultaneous detection of newly found mountain ginseng strains, Korean ginseng, and foreign ginseng in a single reaction was determined to be effective. This study is the first report of scientific discrimination of "mountain ginsengs" and describes an effective method of identification for fraud prevention and for uncovering the possible presence of other, cheaper ginseng species on the market.