Browse > Article
http://dx.doi.org/10.17703/JCCT.2018.4.1.193

An Experiential Case Study of Cyber Financial Fraud: Focusing on specific processes and measures  

Han, Dong-Ho (School of Law, Public Administration and Politics, Kyungsung University)
Publication Information
The Journal of the Convergence on Culture Technology / v.4, no.1, 2018 , pp. 193-200 More about this Journal
Abstract
This study is an experiential case study of cybercrime fraud that combines pharming and voice phishing in April 2017. Research on victims who have actually suffered in the study of crime or disaster is a very useful field in establishing crime prevention measures. This study is significant in that Korea is relatively poor in this kind of research. I got cyber fraud as a consequence of my loss of reasonable judgment due to mental confusion when a companion dog who was raised for 8 years was in a very dangerous situation with cystitis. Fortunately, I received all the damages in a quick report, but the period was eight months. It took too much time to get back all the damages, so I had to suffer another pain. Based on my experience, I suggest damage prevention measures. First, when a certain condition and a certain amount are transferred, the transaction is automatically stopped or a more strict confirmation procedure is added. Secondly, trafficking means to arrest the perpetrator without any harm to the victim is sought. Third, the victims of crime should be promptly reimbursed for damages or a system for lending their living funds to zero or lower interest rate.
Keywords
cyber financial fraud; victim research; participatory observation; experiential case study;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Channel A. "A voice phisher who pretends to be an investigator for 20s....Different Voice Phishing Techniques According to Age." http://v.media.daum.net/v/20180205195641695
2 Clifford Geertz. The Interpretation of Cultures. Basic Books. 1973.. .
3 John Creswell. Qualitative Inquiry and Research Design 2nd Ediditon. Sage Publication. 2007. In this paper, Korean translation(2010, p.112) is used..
4 Mark Goulston. JUST LISTEN: Discover the Secret to Getting Through to Absolutely Anyone. New York: AMACOM. 2009. In this paper, Korean translation, published in 2010, is used.
5 Kihoilbo. "The post office staff blocked voice phishing damage by using her wisdom." http://www.kihoilbo.co.kr/?mod=news&act=articleView&idxno=736083
6 Daily Today. "West police passes a certificate of appreciation to a banker because of preventing voice phishing victim." http://www.dtoday.co.kr/news/articleView.html?idxno=261364
7 Amanda Ripley, The Unthinkable: Who survives when disaster strikes and why. Three Rivers Press: New York. 2008.
8 J. Y. Shin and S. W. Kim, "A Study on Mobil e Crime Prevention.".Journal of Police Science, V ol. 9, No. 2, pp.123-144, 2014.
9 Jaeyeon. Moon and Younghyun Chang,,"Ransomeware Analysis and Method for MInimize the Damage," The Journal of the Convergence Culture Technology (JCCT), Vol. 2, No. 1, pp.79-85, February 2016.   DOI
10 Ji-Ho Shin, "A Study on the Initial Action for the Non-Proliferation of Damage Caused by Smishing." Journal of Digital Forensics, Vol. 9, No. 1, pp.33-46, 2015.
11 Sei-Yeon OH, "The application of digital foren sic investigation for response of cyber-crimes." The Journal of Digital Convergence, Vol. 13, N o. 4, pp.81-87, 2015.   DOI
12 Nocut News "From the doctor to the broker ... voice phishing targeting Professional" http://www.nocutnews.co.kr/news/4783255
13 Y-B Cha, W-Y Choi and G-S Lee, "Proactive Response Against Smishing Using Shorten URL." Journal of Digital Forensics, Vol. 9, No. 1, pp.19-31, 2015.
14 Yeon-Gi Jung, "A Study on Blocking Criminal Websites Based on Internet Domain Registration Data of Phishing Sites." Journal of Digital Forensics, Vol. 9, No. 2, pp.79-96, 2015.
15 G. C. Lim, the 21th Century Internet Policy and Law. Seoul: Bookforyou. pp.274-278. 2013.