• Title/Summary/Keyword: 금전거래

Search Result 45, Processing Time 0.024 seconds

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

A Study on Identifying Effective Financial Similar Domain (효과적인 유사 금융도메인 식별에 관한 연구)

  • Choi, Myung-Hee;Kim, Joo-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.439-442
    • /
    • 2014
  • IT 기술 및 통신이 발전함에 따라, 인터넷을 통한 전자거래가 활성화되면서 금융 대상 피싱 공격이 날로 증가하고 있다. 메일 또는 SMS를 통해 사용자를 위장한 사이트로 접속하도록 유도하여 개인정보를 빼가는 사례가 더욱 빈번해지고 있으며, 금전적인 피해 규모도 급증하고 있다. 그 중에서도 결제 및 금융 관련 사이트가 피싱의 대부분을 차지하고 있다. 본 논문에서는 금융기관 피싱 현황 중 유사 금융 도메인에 대해 살펴보고, 이를 해결하기 위한 방안을 제시하고자 한다. 무엇보다도 유사도메이니의 피싱의 경우, 해당 사이트가 올바른 금융 도메인인지 아닌지를 식별하는 것이 일반 사용자에게 매우 어렵다. 이를 위해 금융 도메인을 쉽게 식별하는 방안 및 효과에 대해 연구하고자 한다.

A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions (온라인 거래 장애 방지를 위한 SQL 성능 기반 IT 응용프로그램 변경관리 프로세스 연구)

  • Kim, Jeong-Hwan;Ko, Moo-Seong;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.817-838
    • /
    • 2014
  • Test environment on the company that handles a large amount of data such as telecommunications companies and financial institutions, may not always be the same as the production environment, which is caused by conversion of important columns about information and limitation of storage capacity due to the construction cost. Therefore, SQL performance degradation that occurs when the test and production environments are not the same, which is an important cause of connecting to the unexpected failures of online transactions, and it generates financial loss of business, customer complaints, a decrease in reliability. In studies related SQL performance, it has so far been conducted mainly studies of tuning associated with DBMS Optimizer, and it has not been addressed issues of this sector. Therefore, in this paper, I verify the validity about presentation of the advanced SQL Performance-based IT application change management process, in order to prevent failures of the online transactions associated with poor performance of SQL generated by differences in test and production environments.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Recent pharming malware code exploiting financial information (금융정보를 탈취하는 최근 파밍 악성코드 연구)

  • Noh, Jung-ho;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.360-361
    • /
    • 2017
  • The infrastructure of the country and society is connected to cyberspace. Malicious codes that steal financial information from websites such as plastic surgeons, dentists, and hospitals that are confirmed as IP in Daegu South Korea area are spreading In particular, financial information is an important privacy target. Takeover of financial information leads to personal financial loss. In this paper, we analyze the recent pharming malicious code that takes financial information. Attack files with social engineering methods are spread as executables in the banner, disguised as downloaders. When the user selects the banner, the attack file infects the PC with malicious code to the user. The infected PC takes users to the farming site and seizes financial information and personal security card information. The fraudulent financial information causes a financial loss to the user. The research in this paper will contribute to secure financial security.

  • PDF

Estimation of Economic Value of Public Housing Parking Lot : Focusing on the Hedonic Price Approach in the Case of Hanam City (공공주택 주차장의 경제적 가치 추정 연구 : 하남시 사례의 헤도닉가격접근법 중심으로)

  • Heo Eun Jin;Choi Sung Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.39-51
    • /
    • 2023
  • This study uses the hedonic price approach to estimate the economic value of a parking lot in an apartment building. In this study, a logarithmic function was applied to estimate the price elasticity of parking spaces. Variables were composed of an independent variable (apartment house characteristics) and a dummy variable (external characteristics). Detailed variables include exclusive area, number of floors, waterproofing, number of bathrooms, and number of parking spaces per household. Based on the results of the analysis for the entire year, the increase in the number of parking spaces affects a price increase of approximately 25.97 million won to 59.68 million won, which can be interpreted as the economic value of the parking space. However, since Hanam City was specified in this study, there is a limit to generalizing the current results and using them for project evaluation.

A Study on the Fraud Detection in an Online Second-hand Market by Using Topic Modeling and Machine Learning (토픽 모델링과 머신 러닝 방법을 이용한 온라인 C2C 중고거래 시장에서의 사기 탐지 연구)

  • Dongwoo Lee;Jinyoung Min
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.45-67
    • /
    • 2021
  • As the transaction volume of the C2C second-hand market is growing, the number of frauds, which intend to earn unfair gains by sending products different from specified ones or not sending them to buyers, is also increasing. This study explores the model that can identify frauds in the online C2C second-hand market by examining the postings for transactions. For this goal, this study collected 145,536 field data from actual C2C second-hand market. Then, the model is built with the characteristics from postings such as the topic and the linguistic characteristics of the product description, and the characteristics of products, postings, sellers, and transactions. The constructed model is then trained by the machine learning algorithm XGBoost. The final analysis results show that fraudulent postings have less information, which is also less specific, fewer nouns and images, a higher ratio of the number and white space, and a shorter length than genuine postings do. Also, while the genuine postings are focused on the product information for nouns, delivery information for verbs, and actions for adjectives, the fraudulent postings did not show those characteristics. This study shows that the various features can be extracted from postings written in C2C second-hand transactions and be used to construct an effective model for frauds. The proposed model can be also considered and applied for the other C2C platforms. Overall, the model proposed in this study can be expected to have positive effects on suppressing and preventing fraudulent behavior in online C2C markets.

UML Sequence Diagram Based Test Case Extraction and Testing for Ensuring Reliability of Web Applications (웹 응용 신뢰성 확보를 위한 UML 순차도 기반의 시험사례 추출 및 시험)

  • 정기원;조용선
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.1-19
    • /
    • 2004
  • The systematic testing is frequently regretted in recent web applications because of time and cost pressure. Moreover developers have difficulties with applying the traditional testing techniques to testing web application. The approach of creating test cases for a web application from a sequence model is proposed for the rapid and efficient testing. Test cases for web application are extracted from call messages (including self-call messages) of UML (Unified Modeling Language) sequence diagram. A test case consists of messages, script functions, or server pages and additional values. Moreover a simple testing tool for web application is proposed. A URL for testing web application is created and executed by this testing tool. The URL consists of server page address and additional values. This test tool is made using Microsoft Visual Basic. The efficiency of proposed method and tool has been shown using a practical case study which reflects the development project of the web application for supporting member management.

  • PDF

A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator (난수생성기를 이용한 멀티채널 보안카드 설계)

  • Seo, Hwa-jeong;Seok, Seon-hee;Kim, Kyoung-hoon;Kim, Ho-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.501-507
    • /
    • 2015
  • The online banking service handles a banking business over the internet, it is necessary to ensure that all financial transactions are processed securely. So, there are various authentication technique for e-banking service : a certificate, a personal identification number(PIN), a security card and a one-time password(OTP). Especially, the security card is most important means including secret information. If the secret information of card is leaked, it means not only loss of security but also easy to attack because security card is a difficult method to get. In this paper, we propose that a multi-channel security card saves an secret information in distributed channel. Proposed multi-channel security card reduces vulnerability of the exposed and has a function to prevent phishing attacks through decreasing the amount of information displayed and generating secret number randomly.

A Study on the Technology Valuation Using Patent Information (컨조인트 기법을 활용한 기술 가치 평가모형: 전기·전자 분야 특허거래 실증 분석)

  • Lee, Kyungpyo;Lim, Dongkyoo;Lee, Sungjoo
    • Journal of Technology Innovation
    • /
    • v.22 no.2
    • /
    • pp.221-245
    • /
    • 2014
  • In the era of fierce global competition and short product life cycle, firms have been interested in the technology valuation to improve their competitiveness. As the technology valuation may become a key issue for countries and industries, the development of technology valuation method has become increasingly important. Thus, this study aims to suggest a novel method to assess technology value by applying conjoint analysis to bibilographic information of patent. For this purpose, we firstly identified nine patent indexes categorized in three attributes - technological superiority, marketability and legal rights. Then, we collected actual data on patent transactions including their patent attributes and market prices. Based on the data, we could obtain the patent index values. Finally, we applied conjoint analysis to the prices and patent index values as a basis for technology valuation. The suggested method is expected to be an effective tool for technology valuation by using real transaction data rather than relying heavily on experts assessment.