• Title/Summary/Keyword: fraud management

Search Result 107, Processing Time 0.027 seconds

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Study on the Fraud Detection in an Online Second-hand Market by Using Topic Modeling and Machine Learning (토픽 모델링과 머신 러닝 방법을 이용한 온라인 C2C 중고거래 시장에서의 사기 탐지 연구)

  • Dongwoo Lee;Jinyoung Min
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.45-67
    • /
    • 2021
  • As the transaction volume of the C2C second-hand market is growing, the number of frauds, which intend to earn unfair gains by sending products different from specified ones or not sending them to buyers, is also increasing. This study explores the model that can identify frauds in the online C2C second-hand market by examining the postings for transactions. For this goal, this study collected 145,536 field data from actual C2C second-hand market. Then, the model is built with the characteristics from postings such as the topic and the linguistic characteristics of the product description, and the characteristics of products, postings, sellers, and transactions. The constructed model is then trained by the machine learning algorithm XGBoost. The final analysis results show that fraudulent postings have less information, which is also less specific, fewer nouns and images, a higher ratio of the number and white space, and a shorter length than genuine postings do. Also, while the genuine postings are focused on the product information for nouns, delivery information for verbs, and actions for adjectives, the fraudulent postings did not show those characteristics. This study shows that the various features can be extracted from postings written in C2C second-hand transactions and be used to construct an effective model for frauds. The proposed model can be also considered and applied for the other C2C platforms. Overall, the model proposed in this study can be expected to have positive effects on suppressing and preventing fraudulent behavior in online C2C markets.

An Empirical Study on General Deterrence Effects of the On-site Investigation System in the Korean National Health Insurance (건강보험 현지조사제도에서 일반적 억제이론에 대한 경험적 연구)

  • Kang, Hee-Chung;Hong, Jae-Seok;Kim, Se-Ra;Choi, Jee-Sook
    • Health Policy and Management
    • /
    • v.19 no.3
    • /
    • pp.109-124
    • /
    • 2009
  • Background: This study aimed to examine whether cases of punishing false claimants threat general physicians to check their medical cost claims with care to avoid being suspected, and identify empirically general deterrence effects of the on-site investigation system in the Korean National Health Insurance. Methods: 800 clinics were selected among a total of 15,443 clinics that had no experience of on-site investigation until June 2007 using a stratified proportional systematic sampling method. We conducted logistic multiple regression to examine the association between factors related to provider's perception of on-site investigation and high level of perceived deterrence referring to fear of punishment after adjusting provider's service experiences and general characteristics. Results: The probability of high perceived deterrence was higher 1.7 times (CI: 1.13-2.56), 2.73 times (CI: 1.68-4.45) each among clinics exchanging the information once or more per year or once or more for 2-3 months than among clinics no exchanging the information about on-site investigation. Also, the probability of high perceived deterrence was higher 2.27 times (CI: 1.28-4.45) among clinics that knows more than 3 health care institutions having experienced an on-site investigation than among clinics knowing no case. Conclusion: A clinic knowing more punishment cases by onsite investigation and exchanging more frequently information about on-site investigation is likely to present high perceived deterrence. This result will provide important information to enlarge preventive effects of on-site investigation on fraud and abuse claims.

Management Method to Secure Private Key of PKI using One Time Password (OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.565-573
    • /
    • 2014
  • We have various e-commerce like on-line banking, stock trading, shopping using a PC or SmartPhone. In e-commerce, two parties use the certificate for identification and non-repudiation but, the attack on the certificate user steadily has been increasing since 2005. The most of hacking is stealing the public certificate and private key files. After hacking, the stolen public certificate and private key file is used on e-commerce to fraud. Generally, the private key file is encrypted and saved only with the user's password, and an encrypted private key file can be used after decrypted with user password. If a password is exposed to hackers, hacker decrypt the encrypted private key file, and uses it. For this reason, the hacker attacks user equipment in a various way like installing Trojan's horse to take over the user's certificate and private key file. In this paper, I propose the management method to secure private key of PKI using One Time Password certification technique. As a result, even if the encrypted private key file is exposed outside, the user's private key is kept safely.

A Blockchain System for History Management of Agrifood (농식품의 이력관리를 위한 블록체인 시스템)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.159-165
    • /
    • 2020
  • The demand for food safety has emerged as a major social issue due to changes in diet patterns and consumers' perceptions, along with the advancements in society and the development of the food industry. Consumers are demanding more information about the food they consume, and are sensitive to food scandals. With such interest in food safety, blockchain technology is attracting attention as a means of effectively responding to poor food management resulting in food fraud or unsafe distribution. By ensuring the accuracy of, and trust in, traceability in the food supply chain, it is possible to build trust between traders and to ensure safe food distribution. This paper proposes a next-generation agri-food distribution system that can provide and manage (for suppliers, consumers, and distribution officials) a variety of agri-food information, such as the history, distribution, safety, quality, and freshness of food. Information on product status and distribution status in all processes, including production, processing, distribution, sales, and consumption, can be monitored and controlled in real time (anytime, anywhere), and users can check the safety level of each type of food in real time through an app.

A Study on Implementing a Priority Tasks for Invigoration of Cloud in Financial sector (금융권 클라우드 도입 활성화를 위한 우선순위 과제 도출 연구)

  • Park, Wonhyo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.8 no.1
    • /
    • pp.10-15
    • /
    • 2020
  • Recently, various industrial sectors have introduced cloud service actively in their business because cloud computing technology enables storage·management and analysis·utilization of data easily in anytime, anywhere. Especially in financial sector, the business provocatively adopted the service and creates various innovative cases; furthermore, already in abroad, the sector has been accelerating digitization of analysis in cases of credit risk, financial fraud data, stock trading etc. On the contrary, in the domestic financial industry, not only the cloud service introduction and innovation cases are underperformed, but most of them are focused on the back-office service. Most Korean financial corporations are burdened with the adoption of cloud service due to various conservative regulatory requirements, such as regulations on data storage and management, regulations on privacy, and other tasks such as developing decision models and establishing responsibility standard for security incidents and service failures. In this study, it would be aimed to contribute to promote the introduction of the cloud in the domestic financial sector by drawing up preemptive challenges and inspecting priorities.

  • PDF

Role of Police for Enhancement of Elderly Safety (노인안전 강화를 위한 경찰의 역할)

  • Cha, Min-Kyu;Kwack, Dae-Gyung
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.387-408
    • /
    • 2014
  • South Korea already became an aging society, and is now in the process of becoming an aged society. With increasing elderly population, elderly safety issues such as traffic accidents and elderly suicides are becoming important problems. Elderly victimization are increasing, and elderly safety accident is also becoming an imporotant social problem. The police is doing various activities for elderly safety. The police is conducting programs for the elderly, such as a prevention program for fraud against elderly, and safety checks and traffic safety education for preventing elderly traffic accidents. Also, there's a program of providing regular visits for a lone elderly, expansion of CCTV network and fingerprint registration to prevent elderlies with Alzheimer's disease going missing. However, these programs are not done on a national scale, but rather limited to local police stations. The purpose of this study is to seek police roles for enhancing elderly safety, due to lack of police activity in this area. Recommendation for police roles in enhancing elderly safety is to first conduct routine crackdowns on fraud against elderly and also conduct education programs for preventing fraud. Also, crimes such as elderly abuse is lead by elderly protection agencies, but considering elderly abuse is a crime, the police should take a leading role. Also, to prevent elderly suicide, meticulous management of elderlies with high suicide risk is necessary, and elderly protection areas should be designated to prevent traffic accidents. Also, elderlies should be induced to turn in their driver's license. To conduct these matters of elderly safety, an organization exclusively charged with elderly safety is necessary. Elderly safety is a broad concept, and since police alone cannot handle the task of ensuring elderly safety, the police should take on a leading role in cooperative efforts with various institutions of the government, non-profit organizations and the community to establish a social saftey net for elderly safety.

  • PDF

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

Stock Market Forecasting : Comparison between Artificial Neural Networks and Arch Models

  • Merh, Nitin
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.1
    • /
    • pp.1-12
    • /
    • 2012
  • Data mining is the process of searching and analyzing large quantities of data for finding out meaningful patterns and rules. Artificial Neural Network (ANN) is one of the tools of data mining which is becoming very popular in forecasting the future values. Some of the areas where it is used are banking, medicine, retailing and fraud detection. In finance, artificial neural network is used in various disciplines including stock market forecasting. In the stock market time series, due to high volatility, it is very important to choose a model which reads volatility and forecasts the future values considering volatility as one of the major attributes for forecasting. In this paper, an attempt is made to develop two models - one using feed forward back propagation Artificial Neural Network and the other using Autoregressive Conditional Heteroskedasticity (ARCH) technique for forecasting stock market returns. Various parameters which are considered for the design of optimal ANN model development are input and output data normalization, transfer function and neuron/s at input, hidden and output layers, number of hidden layers, values with respect to momentum, learning rate and error tolerance. Simulations have been done using prices of daily close of Sensex. Stock market returns are chosen as input data and output is the forecasted return. Simulations of the Model have been done using MATLAB$^{(R)}$ 6.1.0.450 and EViews 4.1. Convergence and performance of models have been evaluated on the basis of the simulation results. Performance evaluation is done on the basis of the errors calculated between the actual and predicted values.

A Study of Effect on Media Exposure and Cybercrime Perception (미디어 노출과 사이버범죄 인식 간의 영향 연구)

  • Ko, Du-Hee;Won, Young-A
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.67-75
    • /
    • 2016
  • This study focused on university students' risk perception of cybercrime through media exposure. For this purpose, I tried to figure out the results of risk perception on cybercrime with 8 factors. As a result, the lowest type of cybercrime was internet fraud, and it was caused by media type and degree of exposure, where university students get information about cybercrime. There's a difference of students' risk perception by media type, news media was the best. Depending on the media of the environment, even in the area of cyber crime there is a difference of perception of risk for each individual. And it can be confirmed that the risk perception in response to the exposure of the media has changed.