• Title/Summary/Keyword: intrinsic fraud

Search Result 5, Processing Time 0.017 seconds

A Study on Recognition of Foreign Judgements Obtained by Fraud (사기에 의하여 취득한 외국재판의 승인에 관한 연구)

  • Lee, Hun-Mook
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.553-591
    • /
    • 2017
  • This article discussed whether so-called 'foreign judgments obtained by fraud' is in breach of public policy provided in Article 217(1)(3) of Civil Procedure Act and, if so, what the specific requirements could be. The summary of the conclusion is as follows. The 'foreign judgments obtained by fraud' is against the municipal procedural public policy and then shall not be recognized. In this regard one more question comes up whether reviewing if 'foreign judgments obtained by fraud' is in breach of the municipal procedural public policy is allowed in consideration of the principle of prohibition of $r{\acute{e}}vision$ au fond. Since the principle is applied entirely in the course of the above reviewing, it is allowed only when it does not breach the principle. The two instances that the reviewing is allowed are where the defendant was not able to produce evidences of fraud during foreign procedures and where the defendant's claim of fraud without evidences was rejected by the foreign court and then evidences of fraud were found after the foreign procedure was completed. On the other hand, the specific requirements for 'foreign judgments obtained by fraud' to be against public policy are following four requirements based on principle of strict interpretation of public policy. (1) plaintiff's intention to fraud, (2) preventing the defendant from being involved in the procedure by fraud or cheating the foreign court using manipulated evidences, (3) the defendant could not present himself in the foreign court procedure due to the plaintiff's extraneous fraud or the foreign court decided wrongly due to intrinsic fraud, and (4) defendant's fundamental procedural rights were breached to the extent that recognizing the effect of foreign judgments was against justice defendant's fundamental procedural rights. These results differ from the Supreme Court 2004. 10. 28. ruling 2002da74213 in many aspects. Most of all, in my opinion there is no need to distinguish between intrinsic fraud and extraneous fraud and reviewing 'foreign judgments obtained by fraud' is not in conflict with the principle of prohibition of $r{\acute{e}}vision$ au fond but the both may coexist. In this regard I expect the variation of the Supreme Court's position and hope to contribute to academia and practitioners.

Illegal Cash Accommodation Detection Modeling Using Ensemble Size Reduction (신용카드 불법현금융통 적발을 위한 축소된 앙상블 모형)

  • Lee, Hwa-Kyung;Han, Sang-Bum;Jhee, Won-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.93-116
    • /
    • 2010
  • Ensemble approach is applied to the detection modeling of illegal cash accommodation (ICA) that is the well-known type of fraudulent usages of credit cards in far east nations and has not been addressed in the academic literatures. The performance of fraud detection model (FDM) suffers from the imbalanced data problem, which can be remedied to some extent using an ensemble of many classifiers. It is generally accepted that ensembles of classifiers produce better accuracy than a single classifier provided there is diversity in the ensemble. Furthermore, recent researches reveal that it may be better to ensemble some selected classifiers instead of all of the classifiers at hand. For the effective detection of ICA, we adopt ensemble size reduction technique that prunes the ensemble of all classifiers using accuracy and diversity measures. The diversity in ensemble manifests itself as disagreement or ambiguity among members. Data imbalance intrinsic to FDM affects our approach for ICA detection in two ways. First, we suggest the training procedure with over-sampling methods to obtain diverse training data sets. Second, we use some variants of accuracy and diversity measures that focus on fraud class. We also dynamically calculate the diversity measure-Forward Addition and Backward Elimination. In our experiments, Neural Networks, Decision Trees and Logit Regressions are the base models as the ensemble members and the performance of homogeneous ensembles are compared with that of heterogeneous ensembles. The experimental results show that the reduced size ensemble is as accurate on average over the data-sets tested as the non-pruned version, which provides benefits in terms of its application efficiency and reduced complexity of the ensemble.

Human Resource Investment in Internal Control and Valuation Errors

  • Haeyoung Ryu
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.293-298
    • /
    • 2024
  • The purpose of an internal control system is to prevent the occurrence of errors and fraud in the process of producing accounting information, thereby providing investors with reliable information. For the effective operation of an internal control system, it is necessary to secure a sufficient number of personnel and experienced staff. This study focuses on the personnel directly involved in producing accounting information, examining whether companies that invest in their internal control staff experience a mitigation in the phenomenon of valuation errors. The analysis revealed that the size and experience months of the personnel responsible for internal control have a significant negative relationship with valuation errors. This result implies that by securing sufficient personnel for the smooth operation of the internal control system and placing experienced staff within the system, investors can effectively make judgments about the intrinsic value based on quality accounting information, thereby reducing valuation errors.

A study on removal of unnecessary input variables using multiple external association rule (다중외적연관성규칙을 이용한 불필요한 입력변수 제거에 관한 연구)

  • Cho, Kwang-Hyun;Park, Hee-Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.5
    • /
    • pp.877-884
    • /
    • 2011
  • The decision tree is a representative algorithm of data mining and used in many domains such as retail target marketing, fraud detection, data reduction, variable screening, category merging, etc. This method is most useful in classification problems, and to make predictions for a target group after dividing it into several small groups. When we create a model of decision tree with a large number of input variables, we suffer difficulties in exploration and analysis of the model because of complex trees. And we can often find some association exist between input variables by external variables despite of no intrinsic association. In this paper, we study on the removal method of unnecessary input variables using multiple external association rules. And then we apply the removal method to actual data for its efficiencies.

Machine Learning-Based Transactions Anomaly Prediction for Enhanced IoT Blockchain Network Security and Performance

  • Nor Fadzilah Abdullah;Ammar Riadh Kairaldeen;Asma Abu-Samah;Rosdiadee Nordin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1986-2009
    • /
    • 2024
  • The integration of blockchain technology with the rapid growth of Internet of Things (IoT) devices has enabled secure and decentralised data exchange. However, security vulnerabilities and performance limitations remain significant challenges in IoT blockchain networks. This work proposes a novel approach that combines transaction representation and machine learning techniques to address these challenges. Various clustering techniques, including k-means, DBSCAN, Gaussian Mixture Models (GMM), and Hierarchical clustering, were employed to effectively group unlabelled transaction data based on their intrinsic characteristics. Anomaly transaction prediction models based on classifiers were then developed using the labelled data. Performance metrics such as accuracy, precision, recall, and F1-measure were used to identify the minority class representing specious transactions or security threats. The classifiers were also evaluated on their performance using balanced and unbalanced data. Compared to unbalanced data, balanced data resulted in an overall average improvement of approximately 15.85% in accuracy, 88.76% in precision, 60% in recall, and 74.36% in F1-score. This demonstrates the effectiveness of each classifier as a robust classifier with consistently better predictive performance across various evaluation metrics. Moreover, the k-means and GMM clustering techniques outperformed other techniques in identifying security threats, underscoring the importance of appropriate feature selection and clustering methods. The findings have practical implications for reinforcing security and efficiency in real-world IoT blockchain networks, paving the way for future investigations and advancements.