• Title/Summary/Keyword: illegal

Search Result 1,457, Processing Time 0.058 seconds

Monitoring of Forbidden Medicines as Adulterants in Dietary Supplements Marketed Online by HPLC and ESI-tandom Mass Spectrometry (HPLC 및 ESI-tandom Mass Spectrometry를 이용한 인터넷에서 판매되는 기능성표방식품 중 부정유해물질 모니터링)

  • Lee, Yong-Cheol;Kim, Bog-Soon;Yun, Eun-Sun;Kim, Sung-Dan;Chang, Min-Su;Park, Young-Ae;Shin, Young;Jung, Sun-Ok;Lee, Jae-In;Chae, Young-Zoo
    • Korean Journal of Food Science and Technology
    • /
    • v.44 no.2
    • /
    • pp.148-154
    • /
    • 2012
  • It was carried out to detect anti-impotence drug-like compounds, sibutramine and their analogues in dietary supplements, which are doubtful whether they include illegal compounds. A total of 51 food products were bought online and have been investigated. The separation was achieved on a C18 column, with the mobile phase made up of water (5 mM sodium hexanesulfonate and 0.1% phosphoric acid) and 95% acetonitrile, at a flow rate of 1.2 mL/min with gradient elution using by HPLC-DAD. The UV signals were monitored at 220 nm and 291 nm. LC-ESI-tandom MS was utilized to confirm that detected compounds in samples are the same as the reference materials. Two nutrient supplement foods and ginseng products were found to contain 1.3-82.1 mg of sildenafil, dimethylthiolsildenafil and pseudovardenafil per serving size. In addition, two other processed products were detected to contain 1.7 and 2.2 mg of didesmethylsibutramine, derived from sibutramine per serving size.

A Study on Improvement of the police disaster crisis management system (경찰의 재난위기관리 개선에 관한 연구)

  • Chun, Yongtae;Kim, Moonkwi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.556-569
    • /
    • 2015
  • With about 75% of the population of Korea criticizing the government's disaster policy and a failure to respond to large-scale emergency like the Sewol ferry sinking means that there is a deep distrust in the government. In order to prevent dreadful disasters such as the Sewol ferry sinking, it is important to secure a prime time with respect to disaster safety. Improving crisis management skills and managerial role of police officers who are in close proximity to the people is necessary for the success of disaster management. With disaster management as one of the most essential missions of the police, as a part of a national crisis management, a step by step strengthening of the disaster safety management system of the police is necessary, as below. First, at the prevention phase, law enforcement officers were not injected into for profit large-scale assemblies or events, but in the future the involvement, injection should be based on the level of potential risk, rather than profitability. In the past and now, the priortiy was the priority was on traffic flow, traffic communication, however, the paradigm of traffic policy should be changed to a safety-centered policy. To prevent large-scale accidents, police investigators should root out improper routines and illegal construction subcontracting. The police (intelligence) should strengthen efforts to collect intelligence under the subject of "safety". Second, with respect to the preparatory phase, on a survey of police officers, the result showed that 72% of police officers responded that safety management was not related to the job descriptions of the police. This, along with other results, shows that the awareness of disaster safety must be adopted by, or rather changed in the police urgently. The training in disaster safety education should be strengthened. A network of experts (private, administrative, and police) in safety management should be established to take advantage of private resources with regard to crisis situtions. Third, with respect to the response phase, for rapid first responses to occur, a unified communication network should be established, and a real-time video information network should be adopted by the police and installed in the police situation room. Fourth, during the recovery phase, recovery teams should be injected, added and operated to minimize secondary damage.

An Analysis of Economic and Psychological Factors on the Forest Protection of the Mountain People in Jeonbuk Province -On the Economic Psychological Status Associated with Structure in Forest Production- (산촌주민(山村住民) 산림보호(山林保護)에 대한 경제적(經濟的) 심리적요인(心理的要因) 분석(分析) -산림생산구조(山林生産構造)에 따르는 경제심리상(經濟心理狀)-)

  • Lee, Kwang Won;Kim, Jae Seng
    • Journal of Korean Society of Forest Science
    • /
    • v.36 no.1
    • /
    • pp.38-46
    • /
    • 1977
  • The purpose of this study are to analyze economic and psychological factors associated with the forest protection of the mountain people, and to explain the forms of the forest management by ownership classes, especially with forest in the production structure of the mountain villages, particulary from Aprial 1st to 20th in 1975. And the basis of the data for this study is to have been obtained by the sample of 462 households, in Jeonbuk province, which were selected by the method of Yandom sampling. In order to determine what relations there are between the forest ownership classes are independent and each of the selected economic and psychological factors, the chi-squre test was used. The findings may be summarized as follows; 1. The area per household forest land of the mountain villages farm families with forest was 1.4ha and are middle classes with the cultivated area, and manage their forest in favor of the forest fuel and the byproducts, which we call "Earn Ownership Management Form". As it is acomplished by the agricultural surplus labor, we can't expect the positive forest investments. 2. The expectation of the proceeds of forest investments seems to be high but 30% of them doubtful. And the mountain villages farm families with above 3ha forest area expect their forest investments to be positive and in future they have hope in the economic management from. 3. The mountainous mountain fram families reply to a small sums of capital and the control of after the fact on account of the negative factors of forest investment. But rural mountain villages farm famillies assist on spending too much money for the control and nexious insects damage. 4. The reason about illegal cut away was mainly their fuels problem and then most of moumtain farm villages was used to forest fuel in their fuel. But 57% of mountainous mountain villages farm families not having forest area, and 66% of them get their fual on the self-supply, and 66.9% of them get from public and nationat forest and other's forest. That is one of the big problems of the forest protection. 5. Above 66% of mountain people think that forest law is severe and 50% of mountainous mountain villages farm families think if usual. Especially ones not having forest area but taking advantage of forest among them think so. 6. Rural mountain villages farm families have comparatively positive attitude for protecting forest, but mountainous mountain villages farm families negative. Classes with above 3ha forest area have more outlook of forest protection. And the more such classes are, the better they can protect forest. 7. There are problem about operation and education of the forest law on the mountainous mountain villages farm families.

  • PDF

WHICH INFORMATION MOVES PRICES: EVIDENCE FROM DAYS WITH DIVIDEND AND EARNINGS ANNOUNCEMENTS AND INSIDER TRADING

  • Kim, Chan-Wung;Lee, Jae-Ha
    • The Korean Journal of Financial Studies
    • /
    • v.3 no.1
    • /
    • pp.233-265
    • /
    • 1996
  • We examine the impact of public and private information on price movements using the thirty DJIA stocks and twenty-one NASDAQ stocks. We find that the standard deviation of daily returns on information days (dividend announcement, earnings announcement, insider purchase, or insider sale) is much higher than on no-information days. Both public information matters at the NYSE, probably due to masked identification of insiders. Earnings announcement has the greatest impact for both DJIA and NASDAQ stocks, and there is some evidence of positive impact of insider asle on return volatility of NASDAQ stocks. There has been considerable debate, e.g., French and Roll (1986), over whether market volatility is due to public information or private information-the latter gathered through costly search and only revealed through trading. Public information is composed of (1) marketwide public information such as regularly scheduled federal economic announcements (e.g., employment, GNP, leading indicators) and (2) company-specific public information such as dividend and earnings announcements. Policy makers and corporate insiders have a better access to marketwide private information (e.g., a new monetary policy decision made in the Federal Reserve Board meeting) and company-specific private information, respectively, compated to the general public. Ederington and Lee (1993) show that marketwide public information accounts for most of the observed volatility patterns in interest rate and foreign exchange futures markets. Company-specific public information is explored by Patell and Wolfson (1984) and Jennings and Starks (1985). They show that dividend and earnings announcements induce higher than normal volatility in equity prices. Kyle (1985), Admati and Pfleiderer (1988), Barclay, Litzenberger and Warner (1990), Foster and Viswanathan (1990), Back (1992), and Barclay and Warner (1993) show that the private information help by informed traders and revealed through trading influences market volatility. Cornell and Sirri (1992)' and Meulbroek (1992) investigate the actual insider trading activities in a tender offer case and the prosecuted illegal trading cased, respectively. This paper examines the aggregate and individual impact of marketwide information, company-specific public information, and company-specific private information on equity prices. Specifically, we use the thirty common stocks in the Dow Jones Industrial Average (DJIA) and twenty one National Association of Securities Dealers Automated Quotations (NASDAQ) common stocks to examine how their prices react to information. Marketwide information (public and private) is estimated by the movement in the Standard and Poors (S & P) 500 Index price for the DJIA stocks and the movement in the NASDAQ Composite Index price for the NASDAQ stocks. Divedend and earnings announcements are used as a subset of company-specific public information. The trading activity of corporate insiders (major corporate officers, members of the board of directors, and owners of at least 10 percent of any equity class) with an access to private information can be cannot legally trade on private information. Therefore, most insider transactions are not necessarily based on private information. Nevertheless, we hypothesize that market participants observe how insiders trade in order to infer any information that they cannot possess because insiders tend to buy (sell) when they have good (bad) information about their company. For example, Damodaran and Liu (1993) show that insiders of real estate investment trusts buy (sell) after they receive favorable (unfavorable) appraisal news before the information in these appraisals is released to the public. Price discovery in a competitive multiple-dealership market (NASDAQ) would be different from that in a monopolistic specialist system (NYSE). Consequently, we hypothesize that NASDAQ stocks are affected more by private information (or more precisely, insider trading) than the DJIA stocks. In the next section, we describe our choices of the fifty-one stocks and the public and private information set. We also discuss institutional differences between the NYSE and the NASDAQ market. In Section II, we examine the implications of public and private information for the volatility of daily returns of each stock. In Section III, we turn to the question of the relative importance of individual elements of our information set. Further analysis of the five DJIA stocks and the four NASDAQ stocks that are most sensitive to earnings announcements is given in Section IV, and our results are summarized in Section V.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Distribution and Vegetation Structure of Genus Cymbidium (Orchidaceae) in Jeju Island (제주도 내 난과(Orchidaceae) 보춘화속(Cymbidium)식물의 분포 및 자생지의 식생 구조)

  • Hyun, Hwa-Ja;Kim, Hae-Ran;Choi, Hyung Soon;Kim, Chan-Soo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.16 no.1
    • /
    • pp.1-10
    • /
    • 2014
  • This study was carried out to investigate the range of distribution and vegetation structure of habitats of genus Cymbidium which is distributed in Jeju Island, Korea. This genus is distributed in tropical and subtropical Asia and North Australia. In Korea, there are six species [i. e. C. goeringii (Rchb. f.) Rchb. f., C. kanran Makino, C. lancifolium Blume var. aspdistrifolium (Fukuy.) S. S. Ying., C. macrorhizum Lindl., C. nagifolium Masam. and C. ensifolium L.], which were also distributed in Jeju Island. The habitats of this genus ranged between 16 meter and 574 meter above sea level in Jeju Island. C. macrorhizum had the broadest altitudinal range (16-574 meter above sea level), whereas C. ensifolium, C. nagifolium and C. lancifolium var. aspidistrifolium had the narrow altitudinal range. According to the classification analysis by TWINSPAN, the plant communities were divided into five groups of Castanopsis sieboldii community, Castanopsis sieboldii-Pinus thunbergii community, Pinus thunbergii-Quercus acutissima community, Pinus thunbergii community and Quercus glauca- Aphananthe aspera community. Three species, C. kanran, C. nagifolium, and C. ensifolium inhabited Castanopsis sieboldii community and C. lancifolium var. aspdistrifolium inhabited Castanopsis sieboldii-Pinus thunbergii community. C. macrorhizum inhabited Pinus thunbergii community, Pinus thunbergii-Quercus acutissima community and Quercus glauca-Aphananthe aspera community. C. goeringii inhabitated Castanopsis sieboldii-Pinus thunbergii community and Pinus thunbergii-Quercus acutissima community. The populations of the genus Cymbidium have been extremely decreased due to illegal collection in Jeju Island. Especially, the distribution range of C. kanran, C. nagifolium, and C. ensifolium was narrow and limited to evergreen broad-leaved forests, therefore, conservation plans are needed for the protection of these species.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

Criminal Liabilities of Ghost Surgery (유령수술행위의 형사책임 - 미용성형수술을 중심으로 -)

  • Hwang, Manseong
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.27-53
    • /
    • 2015
  • Recently, a plastic surgery hospital in Seoul, has been raided following suspicions that ghost surgery was performed by an unauthorized substitute surgeon on a chinese woman who lapsed into a death. Following the incident, an organization to eradicate ghost surgery was created in March by Consumers Korea, founded to protect consumer rights, and the Korea Alliance of Patients Organization. The organization has received reports of illegal medical practices. To substitute another physician without the patient's consent and without his knowledge of the substitution is fraud and deceit and a violation of a basic ethical concept. The patient as a human being is entitled to choose his own physician and he should be permitted to acquiesce in or refuse to accept the substitution. It should be noted that it is the operating surgeon to whom the patient grants his consent to perform the operation. The patient is entitled to the services of the particular surgeon with whom he contracts. The surgeon, in accepting the patient, obligates himself to utilize his personal talents in the performance of the operation to the extent required by the agreement creating the physician-patient relationship. He cannot properly delegate to another the duties which the patient authorizes him to perform personally. 'Ghost surgery' comes under Article 257(Inflicting Bodily Injury on Other or on Lineal Ascendant) of the Criminal Code. Substitution another physician without the patient's consent and without his knowledge of the substitution shall be performed Inflicting Bodily Injury. This is a controversial issue that'ghost surgery' comes under Article 347(Fraud) of the Criminal Code. It maybe controversial that operation substituted by another physician without the patient's consent and without his knowledge of the substitution becomes the component of Fraud. Also, Ghost surgery' comes under Article 27 (Prohibition of Unlicensed Medical Practice, etc.), Article 22 (Medical Records, etc.), Article 33 (Establishment) of the Medical Service Act. The surgeon's obligation to the patient requires him to perform the surgical operation: (1) within the scope of authority granted him by the consent to the operation; (2) in accordance with the terms of the contractual relationship; (3) with complete disclosure of all facts relevant to the need and the performance of the operation; and (4) to utilize his best skill in performing the operation.

  • PDF

Review of 2011 Major Medical Decisions (2011년 주요 의료 판결 분석)

  • Yoo, Hyun-Jung;Seo, Young-Hyun;Lee, Jung-Sun;Lee, Dong-Pil
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.199-247
    • /
    • 2012
  • According to the review and analysis of medical cases that are assigned to the Supreme Court and all local High Court in 2011 and that are presented in the media, it was found that the following categories were taken seriously, medical and pharmaceutical product liability, the third principle of trust between medical institutions, negligence and causation estimation, responsibility limit, the meaning of medical records and related judgment of disturbed substantiation, Oriental doctors' duties to explain the procedures, IMS events, whether one can claim for each medical care operated by non-physician health care institutions to the nonmedical domain in the National Health Insurance Corporation, and the basis of norms for each claim. In the cases related to medical pharmaceutical product liability, Supreme Court alleviated burden of proof for accidents with medical and pharmaceutical products prior to the practice of Product Liability Law and onset the point of negative prescription as the time of damage strikes to condition feasibility of the specific situation. In the cases related to the 3rd principle of trust between medical institutions, the Supreme Court refused to sentence the doctor who has trusted the judgment of the same third-party doctors the violations of the care duty. With respect to proof of a causal relationship and damages in a medical negligence case, the Supreme Court decided that it is unjust to deny negligence by the materials of causal relationship rejecting the original verdict and clarified that the causal relationship shall not deny the reasons to limit doctors' responsibilities. In order not put burden on patients with disadvantages in which medical records and the description of the practice or the most fundamental and important evidence to prove negligence and causation are being neglected, the Supreme Court admitted in the hospital's responsibility for the case of the neonate death of suffocation without properly listed fetal heart rate and uterine contraction monitor. On the other hand, the Seoul Western District Court has admitted alimony for altering and forging medical records. With respect to doctors' obligations to description, the Supreme Court decided that it is necessary to explain the foreseen risks by the combination of oriental and western medicines emphasizing the right of patient's self-determination. However, questions have arisen whether it is realistically feasible or not. In a case of an unlicensed doctor performing intramuscular stimulation treatment (IMS), the Supreme Court put off its decision if it was an unlicensed medical practice as to put limitation of eastern and western medical practices, but it declared that IMS practice was an acupuncture treatment therefore the plaintiff's conduct being an illegal act. In the future, clear judgment on this matter should be made. With respect to the claim of bills from non-physical health care institutions, the Supreme Court decided to void it for the implementation of the arrangement is contrary to the commitments made in the medical law and therefore, it is invalid to claim. In addition, contrast to the private healthcare professionals, who are subject to redemption according to the National Healthcare Insurance Law, the Seoul High Court explicitly confirmed that the non-professionals who receive the tort operating profit must return the unjust enrichment and have the liability for damages. As mentioned above, a relatively wide range of topics were discussed in medical field of 2011. In Korea's health care environment undergoing complex changes day by day, it is expected to see more diverse and in-depth discussions striding out to the development in the field of health care.

  • PDF

Development of Detection Method for Niphon spinosus, Epinephelus bruneus, and Epinephelus septemfasciatus using 16S rRNA Gene (16S rRNA를 이용한 다금바리, 자바리, 능성어 판별법 개발)

  • Park, Yong-Chjun;Jung, Yong-Hyun;Kim, Mi-Ra;Shin, Joon-Ho;Kim, Kyu-Heon;Lee, Jae-Hwang;Cho, Tae-Yong;Lee, Hwa-Jung;Lee, Sang-Jae;Han, Sang-Bae
    • Korean Journal of Food Science and Technology
    • /
    • v.45 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • Niphon spinosus, Epinephelus bruneus, and Epinephelus septemfasciatus are involved in the Perciformes Order and Serranidae Family. When E. bruneus and E. septemfasciatus are fully grown, the striped pattern on the body gradually disappears. Therefore, morphological classification of adult fishes is quite difficult to identify the differences to N. spinosus. In this study, we investigate the method to differentiate those using PCR. To design the primers, 16S rRNA region of N. spinosus, E. bruneus, and E. septemfasciatus registered in the GeneBank (www.ncbi.nlm.nih.gov) have been used and for the analysis, Bio Edit ver. 7.0.9.0 was used. As a result, it was design NS-003-F/NS-005-R (136 bp), EB-001-F/EB-002-R (181 bp), and ES-001-F/ES-001-R (123 bp) primers for the differentiation of each 3 different fishes. Therefore, the species-specific primer sets would be a useful tool for scientific and speedy differentiation against the illegal distribution for consumer protection.