• Title/Summary/Keyword: Internet Fraud

Search Result 82, Processing Time 0.03 seconds

Analysis of C2C Internet Fraud and Its Counter Measures (인터넷 직거래 사기의 실태 및 보안대책)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.141-153
    • /
    • 2015
  • In recent days, internet appears to be a daily necessity, which leads to the increase of internet fraud. This study particularly focuses upon C2C internet fraud, while other researches on internet fraud seldom touch such a topic. The aim of this study is to grasp the stark reality of the soaring C2C online fraud, to categorize the type of the frauds, to identify the root causes of the fraud, and to suggest security measures to prevent the C2C online fraud.

Corporate Financial Fraud and Countermeasures in the Internet Era (인터넷 시대 기업의 재무부정과 대책)

  • Huang, Weidong;Jin, Shanyue
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.35-40
    • /
    • 2022
  • With the advent of the internet age and the outbreak of COVID-19, many companies have embraced online trade. However, due to the way the cyber economy works, the number of companies engaged in financial fraud by falsifying their transaction amounts and customer numbers has been gradually increasing. The purpose of this study is to analyze financial fraud of companies in the Internet era and to present solutions. Therefore, this study analyzed the financial fraud behavior of Luckin Coffee in China as an example and studied the causes and countermeasures of financial fraud. As a result, it was found that the cause of financial fraud lies in the opacity of cash flows from online transactions. The recommendations proposed by this study is to improve internal control systems in companies, develop risk management system, and establish comprehensive external supervision system

Hybrid Fraud Detection Model: Detecting Fraudulent Information in the Healthcare Crowdfunding

  • Choi, Jaewon;Kim, Jaehyoun;Lee, Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1006-1027
    • /
    • 2022
  • In the crowdfunding market, various crowdfunding platforms can offer founders the possibilities to collect funding and launch someone's next campaign, project or events. Especially, healthcare crowdfunding is a field that is growing rapidly on health-related problems based on online platforms. One of the largest platforms, GoFundMe, has raised US$ 5 billion since 2010. Unfortunately, while providing crucial help to care for many people, it is also increasing risk of fraud. Using the largest platform of crowdfunding market, GoFundMe, we conduct an exhaustive search of detection on fraud from October 2016 to September 2019. Data sets are based on 6 main types of medical focused crowdfunding campaigns or events, such as cancer, in vitro fertilization (IVF), leukemia, health insurance, lymphoma and, surgery type. This study evaluated a detect of fraud process to identify fraud from non-fraud healthcare crowdfunding campaigns using various machine learning technics.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

A Qualitative Study on the Process of Juveniles' Steeping in Cyber Crime : Focused on Internet Fraud (청소년이 사이버범죄에 빠지는 과정 - 인터넷사기 중심으로 -)

  • Choi, Ok-Chai
    • Korean Journal of Social Welfare
    • /
    • v.56 no.4
    • /
    • pp.103-122
    • /
    • 2004
  • This study is aimed to examine the process of juveniles' steeping in cyber crime for finding out data which could be applied to prevent juveniles' cyber crime and to rehabilitate the juveniles related in cyber crime. Also, this study is designed focusing on the Grounded Theory method, and 5 probationees connected with internet fraud have been interviewed as participants for this study. For the juveniles who had been steeped in cyber crime, some findings according to the analysed data have been emerged in the context of social work intervention. First, interventions need to be focused on the improvement of social environment and juveniles' crooked thoughts to prevent juvenile's Internet fraud and to rehabilitate juveniles related with Internet fraud. Second, workers need to guide the juveniles who have been indecisive on the another crime into regretting their guilty attitude in depth. Third, the prevention of juveniles' Internet fraud needs to be conducted on the level of social movement, and social work practice centers need to grope concrete programs networked with correctional authorities for the social movement.

  • PDF

Fraud Click Identification Using Fingerprinting Method (핑거프린팅 기법을 이용한 부정 클릭의 식별)

  • Hong, Young-Ran;Kim, Dong-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.159-168
    • /
    • 2011
  • To identify fraud clicks in the Internet advertisement, existing studies have considered keyword, visit time, and client IP as an independent variable for the standard. These methods have limitations in identifying the fraud clicks that utilize automation tools, for they are methods based on client IP and human activities on the Internet. This paper proposes that fingerprinting values of the variable combination should be used to identify fraud clicks. The proposed model is composed of 3 stages and the fingerprinting values are compared with the other input data at each stage; IP fingerprinting in the first stage, IP and session data fingerprinting in the second stage, and session data and keyword fingerprinting in the third stage. We showed that the proposed model of the fraud click identification is more correct than existing methods through experiments according to the proposed scheme.

An Empirical Study on the Detection of Phantom Transaction in Online Auction (온라인 경매에의 카드깡 탐지요인에 대한 실증적 연구)

  • Chae Myeong-Sin;Jo Hyeong-Jun;Lee Byeong-Chae
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.68-98
    • /
    • 2004
  • Although the internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders because the chance of detection and punishment are decreased. One of fraud is phantom transaction which is a colluding transaction by the buyer and seller to commit illegal discounting of credit card. They pretend to fulfill the transaction paid by credit card, without actual selling products, and the seller receives cash from credit card corporations. Then seller lends it out buyer with quite high interest rate whose credit score is so bad that he cannot borrow money from anywhere. The purpose of this study is to empirically investigate the factors to detect of the phantom transaction in online auction. Based up on the studies that explored behaviors of buyers and sellers in online auction, bidding numbers, bid increments, sellers' credit, auction length, and starting bids were suggested as independent variables. We developed an Internet-based data collection software agent and collect data on transactions of notebook computers each of which winning bid was over 1,000,000 won. Data analysis with logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transaction.

  • PDF

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

A Study of Regulating Internet Escrow Services in Electronic Commerce (전자상거래상의 인터넷 에스크로 서비스의 규제에 관한 연구)

  • 김정곤
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.215-226
    • /
    • 2004
  • As with the fast spread of internet uses in recent years, electronic commerce has evolved. The proliferation of electronic commerce has increased diverse forms of fraud cases since internet helps intended criminals remain anonymous. In absence of effective tools to warrant the reliability of parties offering products or services through electronic commerce, consumers have to absorb damages unfairly. Internet escrow service has been considered to be an option to establish reliability between buyers and sellers and to protect consumers from possible fraud cases. However, like other industries, fraudulent escrow services have appeared in internet. This study has been intended to analyze fraudulent internet escrow services and to propose an effective regulatory system of internet escrow services. To do that, this study benchmarked the regulation of the State of California, primarily focusing on the formation of escrow company, regulation of escrow business, and remedies for wrongdoing, so Korea can consider the adoption of similar systems.

  • PDF

Research on the Financial Data Fraud Detection of Chinese Listed Enterprises by Integrating Audit Opinions

  • Leiruo Zhou;Yunlong Duan;Wei Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3218-3241
    • /
    • 2023
  • Financial fraud undermines the sustainable development of financial markets. Financial statements can be regarded as the key source of information to obtain the operating conditions of listed companies. Current research focuses more on mining financial digital data instead of looking into text data. However, text data can reveal emotional information, which is an important basis for detecting financial fraud. The audit opinion of the financial statement is especially the fair opinion of a certified public accountant on the quality of enterprise financial reports. Therefore, this research was carried out by using the data features of 4,153 listed companies' financial annual reports and audits of text opinions in the past six years, and the paper puts forward a financial fraud detection model integrating audit opinions. First, the financial data index database and audit opinion text database were built. Second, digitized audit opinions with deep learning Bert model was employed. Finally, both the extracted audit numerical characteristics and the financial numerical indicators were used as the training data of the LightGBM model. What is worth paying attention to is that the imbalanced distribution of sample labels is also one of the focuses of financial fraud research. To solve this problem, data enhancement and Focal Loss feature learning functions were used in data processing and model training respectively. The experimental results show that compared with the conventional financial fraud detection model, the performance of the proposed model is improved greatly, with Area Under the Curve (AUC) and Accuracy reaching 81.42% and 78.15%, respectively.