• Title/Summary/Keyword: fraud

Search Result 441, Processing Time 0.021 seconds

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.

A Comparative Assessment Between ACSS of Canada and FedACH of America as a Electronic Payment System (전자결제시스템으로서 캐나다의 ACSS와 미국의 FedACH의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.55-78
    • /
    • 2016
  • This paper discusses on Electronic Payment System between U.S.A. and Canada. In particular, I focused on ACSS compare with FedACH(Fed Automated Clearing House) to advance a research effects. Because both of them is a low-value, high-volume retail payment system which their countries represent. The ACSS(Automated Clearing Settlement System) is the system through which the vast majority of CPA payment items are cleared, through various payment streams. In 2014, ACSS system cleared approximately 6.8billion payments worth a total value of $ 44.9 trillion. While, The FedACH Network are the center of America Commerce, moving more than $40 trillion each year. That's made up of almost 23 billion electronic financial transaction, including direct deposit via ACH, social security and government benefits, electronic bill payments such as utility and mortgage payments. Thus in this article, first of all, I considered features of payment system and the types of payment items between ACSS and FedAch. Second, I analyzed the status of central bank and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that their payment and banking system have to assume, with good reason, more efficiently accurately and securely operation to protect their customer from credit risk and financial fraud.

  • PDF

Narratives and Emotions on Immigrant Women Analyzing Comments from the Agora Internet Community(Daum Portal Site) (이주여성에 관한 혐오 감정 연구 다음사이트 '아고라' 담론을 중심으로)

  • Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.75
    • /
    • pp.43-79
    • /
    • 2016
  • An increase in the number of immigrants to Korea since the late 1980s' has signified the proliferation of globalization and global capitalism. In Korea, most married immigrants are women, as the culture emphasizes patrilineage and the stability of the institution of marriage, particularly in rural areas. Immigrant women have experienced dual ordeals. The Aogra Internet community in Korea has been one of the most representative sites that has shown the power of communities in cyberspace since 2002, leading the discussion of social issues and deliberative democracy both online and offline. This paper analyzed Koreans' writings (such as long comments) on immigrant women in the Agora community. The analysis revealed the following results: first, immigrant women were referred to using terms related to prostitution, with excessive expression of disgust, which is called a "narrative of identity." Second, anti-multiculturalists called Korean men victims of married immigrant women and expressed hatred toward immigrant women, which is called a "narrative of sacrifice." Third, anti-multiculturalists justified their emotions as just resentment based on ideas of justice, equality, and patriotism, concealing the emotion of disgust, which is called the "narrative of justice, equality." Fourth, antimulticulturalists played roles to spread the emotion of disgust, by repeatedly referring to international marriage fraud and immigrant workers' crimes, which is called "narrative of crime." Fifth, some positive writings on immigrant women were based on empathy(a concept defined in this context by Martha Nussbaum), but they can be analyzed as narratives encouraging cultural integration through the perspective of orientalism. Therefore, comments on immigrant women in the Agora represent a "catch-22" dilemma. To deal with conflicts arising from disgust and violations of human rights, civic education focusing on humanism is needed in this multicultural era.

  • PDF

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

A Study on Continuous Monitoring Reinforcement for Sales Audit Using Process Mining Under Big Data Environment (빅데이터 환경에서 프로세스 마이닝을 이용한 영업감사 상시 모니터링 강화에 대한 연구)

  • Yoo, Young-Seok;Park, Han-Gyu;Back, Seung-Hoon;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.123-131
    • /
    • 2016
  • Process mining in big data environment utilize a number of data were generated from the business process. It generates lots of knowledge and insights regarding implementation and improvement of the process through the event log of the company's enterprise resource planning (ERP) system. In recent years, various research activities engaged with the audit work of company organizations are trying actively by using the maximum strength of the mining process. However, domestic studies on applicable sales auditing system for the process mining are insufficient under big data environment. Therefore, we propose process-mining methods that can be optimally applied to online and traditional auditing system. In advance, we propose continuous monitoring information system that can early detect and prevent the risk under the big data environment by monitoring risk factors in the organizations of enterprise. The scope of the research of this paper is to design a pre-verification system for risk factor via practical examples in sales auditing. Furthermore, realizations of preventive audit, continuous monitoring for high risk, reduction of fraud, and timely action for violation of rules are enhanced by proposed sales auditing system. According to the simulation results, avoidance of financial risks, reduction of audit period, and improvement of audit quality are represented.

Analysis of Horticultural Activities and Plants Preference on Prisoners Scheduled for Release (사회복귀예정 수형자의 원예활동 및 원예식물 선호도 분석)

  • Lee, Sang-Mi;Jeong, Sun-Jin;Moon, Ji-Hye;Lee, Ye-Jee;Lee, Sook
    • Journal of agriculture & life science
    • /
    • v.46 no.6
    • /
    • pp.87-96
    • /
    • 2012
  • This study was performed to analyze the preference about horticultural activities and plants which is the basis of the horticultural therapy program development in prisoner who release from prison is expected. The analysis show that respondents were the most in male, thirty, less than high school, fraud, Christianity. More than 70% of respondents recognize that providing horticultural therapy for correction and rehabilitation program was desirable. More than 60% of respondents want to participate in the horticultural therapy for correction and rehabilitation program. Respondents who hadn't have experience for horticultural activities were the most, they preferred 'Plant appreciation such as walking, field trip, journey' mostly, and then 'Plant cultivation at indoor and outdoor', 'Decoration and craft with plant'. The most preferred plant was ornamental plant, and orchid in ornamental plant, fruit vegetable and tomato in fruit vegetable.

New Trend called 'Magic' and its aftereffects in 1920 (1920년대 마술의 유행과 그 여파)

  • Shin, Keun-young
    • (The) Research of the performance art and culture
    • /
    • no.35
    • /
    • pp.175-202
    • /
    • 2017
  • In this article, I focused on the identity of the Japanese magician, Tenkatsu(天勝), who appeared in Exhibition of Joseon, 1915, and the social gaze and reverberation of them. I would like to see how Tenkatsu group appeared, how it was active, and how it was utilized. Because It was a big stimulus for traditional performing artists. 'Ma-sul' was a new word, taking the place of 'Hwan-sul(幻術)' or 'Hwan-hee'(幻?) for a term of english 'Magic'. In the various articles published during the Japanese colonial period, we can find the performers of the contemporary magic and the Korean artists who tried to make them nationalized. In the mid-1920s, a magician of Korean origin appeared. Kim Mun-phil(김문필), Park Chang-sun(박창순), Kim Wan-shil(김완실) were them. They had experience of studying abroad, such as Russia, and were also helped by religion, the Chondo-kyo. They attracted popularity while touring around the country. Incidents of social problems often arise by linking magic to a form of fraud, though. But the appearance of a Korean magician confirms the existence of a performer who actively engages in new performances.

A Study on the Types of Crime and Scalability in Metaverse (메타버스 내 범죄발생 유형과 확장성에 관한 연구)

  • Song, HyeJin;Nam, Wanwoo
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.218-227
    • /
    • 2022
  • Purpose: In the case of cavity discovered by ground penetrating radar exploration, it is necessary to accurately predict the filling amount in the cavity in advance, fill the cavity sufficiently and exert strength to ensure stability and prevent ground subsidence. Method: The cavity waveform analysis method by GPR exploration and the method using the cavity shape imaging equipment were performed to measure the cavity shape with irregular size and shape of the actual cavity, and the amount of cavity filling of the injection material was calculated during rapid restoration. Result: The expected filling amount was presented by analyzing the correlation between the cavity size and the filling amount of injection material according to the cavity scale and soil depth through the method by GPR exploration and the cavity scale calculation using the cavity shaping equipment. Conclusion: The cavity scale measured by the cavity imaging equipment was found to be in the range of 20% to 40% of the cavity scale by GPR exploration. In addition, the filling amount of injection material compared to the cavity scale predicted by GPR exploration was in the range of about 60% to 140%, and the filling amount of the injection material compared to the cavity size by the cavity shaping equipment was confirmed to be about 260% to 320 Purpose: The purpose of this study is to examine the types of crimes taking place in the metaverse, and to establish a crime prevention strategy and find a legal deterrent against it. Method: In order to classify crime types in the metaverse, crime types were analyzed based on the results of previous studies and current incidents. Result: Most of the crimes taking place in the metaverse are done in games such as Roblox or Zeppetto. Most of the game users were teenagers. Looking at the types, there are many teens for sexual crimes, violent crimes, and defamation, but professional criminals are often included in copyright infringement, money laundering using virtual currency, and fraud. Conclusion: Since the types of crimes in the metaverse are diverse, various institutional supplementary mechanisms such as establishment of police crime prevention strategies, legal regulations, and law revisions will have to be prepared.

A Phenomenological Study on the Burnout of Specialized Counselors in the 117 Report Center - Application of the Integrated Working System of Government Departments- (117 신고센터 전문상담 요원의 소진에 관한 현상학적 연구 -정부 부처 통합근무 체제 적용-)

  • Youn, Yang-suk;Kim, Eun-hye
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.85-91
    • /
    • 2022
  • In modern society, the field of life is expanding to complex and diverse fields according to changes in lifestyle. As people's consciousness also changes, various social problems are involved, and countermeasures are being taken in various ways. In particular, as the issue of school violence has become a subject of interest, government-related ministries have jointly set up a reporting center and professional counselors are receiving and consulting on damage reports. Counselors experience mental and physical exhaustion in the course of their work. Therefore, the need to contribute to effective counseling work is raised by studying the factors that cause burnout. This study collected the experiences of 10 counselors working at 117 reporting centers from February 2019 to May 2020 through interviews and analyzed them with Colaizzi's phenomenological research method. The exhaustion factors derived from the results of the study were first experiences such as conflict between counselors during the period of institutional integration in the "117 reporting center experience", and secondly, professional counselors experienced emotional exhaustion, inhumanization, and lack of achievement. In order to prevent and overcome the exhaustion factors of counseling agents, it was necessary to prepare measures to promote fraud. This is expected to be useful data for improving the working environment of special job counselors in the era of industrialization and informatization in which various anonymous counseling methods are used.