• Title/Summary/Keyword: 내부거래

Search Result 237, Processing Time 0.029 seconds

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Survey on Analysis and Countermeasure for Hacking Attacks to Cryptocurrency Exchange (암호화폐 거래소 해킹 공격 분석 및 해결 방안 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As the value of technical information increases, hacking attacks are trying to steal technical information through hacking. Recently, hacking of cryptocurrency exchanges is much easier to monetize than existing technical information, making it a major attack target for hackers. In the case of technical information, it is required to seize the technical information and sell it to the black market for cashing.In the case of cryptocurrency, most hacking attacks are concentrated on cryptocurrency exchanges because it is easy to cash out and not easy to track when successful hacking. Although technology cannot be hacked, cryptocurrency transactions traded on cryptocurrency exchanges are not recorded on the blockchain which is simply internal exchanges, so insiders may manipulate the quotes and leave gaps or leak out. Therefore, this research analyzes the recent hacking attacks of cryptocurrency exchanges and proposes solutions to secure cryptocurrency trading.

The Effect of Controlling Shareholders md Related-Party Transactions on Firm Value (대주주 소유구조 및 연계거래 여부가 기업가치에 미치는 영향에 관한 실증연구)

  • Lee, Won-Heum
    • The Korean Journal of Financial Management
    • /
    • v.23 no.1
    • /
    • pp.69-100
    • /
    • 2006
  • We examine the effect of controlling shareholders ownership structure and related-party transactions(hereafter 'RPT') of publicly traded companies on their firm values during the post-IMF period. In the multivariate regression analysis using control variables such as firm size, capital structure, investment, dividend, profitability and industry dummy that might affect firm values, we find that there exists a significant negative relation between the controlling shareholders ownership structure and firm values proxied by Tobin's Q, and also find that there is a significant negative relation between RPT and the firm values. Those evidences seem to support the controlling shareholders' expropriation hypothesis. Additionally, we investigate the relation between ownership structure and rim value through the piecewise regression analysis. We find a significant 'inverse' U-shape pattern between the controlling shareholders ownership structure and firm values. This result is quite different from the existing literatures that have usually reported an U-shape pattern. In conclusion, the findings in this study do not support the notion that the ownership concentration to the controlling shareholders does negatively affect the firm values monotonically.

  • PDF

A Study on the Transaction Governance Structure in B2B Electronic Commerce (기업 간 전자상거래 지배구조의 변화에 관한 연구)

  • Kwon, Sun-Dong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.5 no.4
    • /
    • pp.35-49
    • /
    • 2010
  • The purpose of this study is to help the venture business innovate the purchasing process. This study reviewed the types of transaction governance structure, and researched the change of transaction governance structure, while using information technology. According to transaction cost theory, the transaction governance structure can be moved from hierarchy to market. It can be moved to the middle, because of economies of scale, incentive for supplier, and increasing search cost. And it can be moved from market exchange to relational exchange, using electronic marketplace. In order to innovate the purchasing process, the venture business can select the transaction governance structure that fits the its purchasing contexts.

  • PDF

An Exploratory Investigation of On-line Organizational Structure Design for the E-Commerce Firm (전자거래기업에서의 온-라인 조직구조 설계방안에 관한 연구)

  • Yoon, Jung-Hyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.21-39
    • /
    • 2005
  • This paper focused on exploratory testing the organizational management area by examining conceptualized relationships between e-commerce usage type and organizational structure. The research model consists of three e-commerce usage type such as buy-side, internal, sell-side activities and four organizational structure dimensions like decentralization, specialization, formalization, and administration intensity. An interview and an e-mail survey of managers were used to obtain information on the variables relevant to e-commerce activities and organizational structure. The data resulted in response from 58 companies. Major findings of this research are summarized as follows: buyer related e-commerce activities is positively relate to the administrative intensity and the specialization, internal process is positively relate to the formalization, while customer related e-commerce is directly relate to the decentralization and the specialization in terms of organizational management.

  • PDF

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

Key Recovery Policy and System Design for Intranet (인트라넷용 키 복구 정책 및 시스템 설계)

  • 임신영;이병천;함호상;박상봉
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.151-165
    • /
    • 1998
  • 인터넷 전자상거래가 가속화 되면서 기업간 인터넷을 이용한 전자상거래가 증가하고 있다. Business-To-Business 유형의 전자상거래는 인터넷 EDI 또는 글로벌 비즈니스 개념이 도입되어 관련 기술의 연구개발이 활발히 진행중이며 상용화된 서비스가 일부 제공되고 있다. 기업간 전자상거래 시 기업내부 인력이 외부 즉, 거래 대상 기업 또는 경쟁 관계의 기업에 자사의 영업 및 기업 비밀을 제공하는 것은 명백한 범법 행위이다. 또한 인트라넷 내부 즉, 기업 내부망에 연동된 시스템을 사용하는 직원들이 정해진 근무시간에 다른 용도로 시스템 및 전산망 자원을 사용한다면 이 또한 회사 내부적으로 규제 대상이 되어야 한다. 특히, 일과외 시간에 공적 또는 사적인 용도 외에 사용자와는 전혀 관련 없는 전자우편 주소로 암호화된 문서를 송수신하였다면 기업 책임자는 기업의 시스템 및 전산망 자원을 업무 및 개인 용도 외적으로 사용한 의심스러운 행위에 대하여 확인할 권한이 있다고 본다. 본 논문은 기업간 전자상거래 수행 과정에서 기업 내부망 즉, 인트라넷에서 적용될 수 있는 보안 정책 중 키 복구 메커니즘이 적용될 수 있는 부분을 중심으로 새로운 키 복구 정책, 시나리오, 시스템 구성 및 키 복구 프로토콜을 제안한다.

  • PDF

The Protection of Third Parties of the Transactions Made by the Representative Director without Resolution Adopted by the Board of Directors (대표이사의 이사회 결의를 흠결한 거래행위와 제3자의 보호)

  • Shin, Tae-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.392-402
    • /
    • 2022
  • The purpose of this study is to examine the protection of third parties of the transactions made by the representative director without resolution adopted by the board of directors. The legal effect of a transaction conducted by a representative director without board resolution in violation of internal restriction or statutory restriction is at issue. The Supreme Court of Korea('SCK') made a new ruling that revised the prior case law(Supreme Court en banc Decision 2015Da45451, Feb. 18, 2021). The SCK in the subject case proclaimed a legal doctrine that 'a third party acting in good faith' shall be protected according to Article 389(3) and 209(2) of the Korean Commercial Act, except that 'a third party with gross negligence' is considered as 'a person acting in bad faith' and thus is excluded from protection. The subject case law can be evaluated as broadening the scope of protection of the third party. In addition, the subject case is meaningful in that it is balance with the related SCK ruling, which considered a third party with gross negligence as a person acting in bad faith while protecting a third party with ordinary negligence in the case of transactions involving apparent representative directors, etc.

The Influences of Transaction Information about Alliance Partner on Alliance Performance -the mediating role of opportunism- (제휴파트너에 대한 거래정보가 공동마케팅 제휴성과에 미치는 영향 -기회주의 성향의 매개적 역할을 중심으로-)

  • Kim, Young;Kim, Jong-Sung
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.113-131
    • /
    • 2002
  • The purpose of this study is to investigate the influences of transaction information and reputation about alliance partner on opportunism and alliance performance. In this study, a structural model and several hypotheses were developed regarding the relationships between transaction term, transaction records, reputation of alliance partner, opportunism, and alliance performance. Based on the collected data, the structural model was analyzed with Lisrel 8.12. The results can be summarized as follows. First, the longer the transaction term, the lower the opportunism and the higher the perceived alliance performances. Second, the better the transaction records, the lower the opportunism and the higher the perceived alliance performances. Third, the reputation of alliance partner company has not any influence on the opportunism and the perceived alliance performances. Finally, the lower the opportunism of alliance partner, the higher the perceived alliance performances. At the end of the paper, managerial implications and future research directions are discussed.

  • PDF

핸디*솔루션 분산객체 모델의 기업정보시스템 통합도구

  • 전영표
    • Proceedings of the CALSEC Conference
    • /
    • 1998.10a
    • /
    • pp.255-268
    • /
    • 1998
  • $\square$ 정보기술 변화에 적극적 수용 및 대처 $\textbullet$ 다운사이징/라이트사이징 $\textbullet$ 분산 네트워크환경, 인터넷/인트라넷 $\textbullet$ 그룹웨어 : 원활한 의사소통, 폭 넓은 정보공유, 신속한 의사결정 $\square$ 기업환경 변화에 적극적 수용 및 대처 $\textbullet$ Workflow: 경영혁신/프로세스 표준화 $\textbullet$ ERP: 기업 내부 업무의 전사적 통합 및 관리를 통한 경영 효율화 $\textbullet$ KMS: 지식의 정보화, 사람관리체제에서 지식관리 체제로 $\textbullet$ SCM: 제조에서 구매에 이르기까지 전 공급라인을 효율적으로 관리하여 재고를 최소화하고 비용을 최소화 $\textbullet$ CALS: 표준화를 통하여 기업간 거래를 효율화 $\square$ 정보시스템 환경의 변화 $\textbullet$ 정보기술혁신 + 기업환경 변화 =기업통합 (Electronic Collaboration) $\textbullet$ 복잡하고 다양해지는 요구 대처: 분산환경에서의 객체기술 $\square$ 기업 통합을 위한 응용시스템 $\textbullet$ 그룹웨어, ERP, SCM, PDM, KMS‥‥ $\textbullet$ 기업통합의 근간은 프로세스 설계 및 표준화 $\square$ 핸디*솔루션 $\textbullet$ 기업 통합 (Electronic Collaboration) 정보시스템 도구 $\textbullet$ 분산 객체 모델 $\textbullet$ 워크플로우를 근간으로 한 SCM 지원의 정보시스템 개발 환경(중략)

  • PDF