• Title/Summary/Keyword: Embezzlement

Search Result 19, Processing Time 0.044 seconds

A Study on Casino Embezzlement Incident Analysis and Forensic Investigation Technology (카지노 횡령사건 분석과 포렌식 수사기술 연구)

  • Lee, Gyu-An;Park, Dae-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.105-110
    • /
    • 2011
  • Embezzlement incident of staff at the casino occurred. Staff of some casinos have lower job satisfaction, moral gap is seriously considering a change jobs. In addition, cash lure of large amounts and a lack of money management system causes embezzlement incident. In this paper, the uniqueness of the casino industry and that employee job satisfaction is investigated. Content analysis of occurrence for casino embezzlement incident and tracking that bank account and bank check, suspect's call list, and so on that digital forensic investigation technology will be studied. Problems and solutions suggest that conducted a loss prevention program, a digital forensics technology and introduce of investigator. Through this study, the computerization of the casino business to embezzlement accident prevent will contribute to that give back profits of property to society, the develop of forensic investigation technology.

Public Perceptions of Public Social Workers in Comments of the Internet Media Discussion Rooms after Welfare Embezzlement Cases in 2008 (인터넷 토론방 댓글에 나타난 사회복지전담공무원에 대한 대중의 인식 -2008년에 발생한 복지지원금 횡령사건 이후를 중심으로-)

  • Park, Hyang-Kyung;Chung, Ick-Joong
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.391-415
    • /
    • 2010
  • Recently, there were some welfare embezzlement cases of public social workers. The purpose of this study is to explore public perceptions of public social workers by analysing the comments named "datgeul" in the internet media discussion rooms("toronbang") about welfare embezzlement cases of public social workers. The results show that the main discourse about public social workers to perform a dual role as the public servants and social workers on the front line of public social welfare is that they are the victims of both a public official system and welfare administration system. In addition, social workers in public sphere are still recognized as service personnels with sacrifice and commitment rather than as professionals. Finally, the implications of this study were discussed to improve public perceptions of social welfare professionals.

  • PDF

Blockchain Innovation Technology for Corruption Decrease in Mexico

  • Garcia, Hugo Cesar Enriquez
    • Asian Journal of Innovation and Policy
    • /
    • v.10 no.2
    • /
    • pp.177-194
    • /
    • 2021
  • This research is based on the scope that the disruptive technology known as Blockchain has to face corruption in different phases and spheres of government. This technological method is increasing its acceptance in various socio-economic aspects in recent years, the paper's emphasis is placed on Mexico, and nevertheless it practically can be used to reduce corruption in all countries around the world. The materials and method carried out for this research was a literature review in diverse databases with the most recent literature where some applications, uses and hypothetical cases of the implementation of Blockchain within the government framework in order to reduce corruption were highlighted. The results of this research suggest that the Mexican government can reduce some types of corruption, especially those related to money and collusions, such as biddings/government tenders, government procurement and acquisitions, audits in government agencies, in the embezzlement or diversion of funds, as well as in land registration.

An empirical study on a firm's fail prediction model by considering whether there are embezzlement, malpractice and the largest shareholder changes or not (횡령.배임 및 최대주주변경을 고려한 부실기업예측모형 연구)

  • Moon, Jong Geon;Hwang Bo, Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.1
    • /
    • pp.119-132
    • /
    • 2014
  • This study analyzed the failure prediction model of the firms listed on the KOSDAQ by considering whether there are embezzlement, malpractice and the largest shareholder changes or not. This study composed a total of 166 firms by using two-paired sampling method. For sample of failed firm, 83 manufacturing firms which delisted on KOSDAQ market for 4 years from 2009 to 2012 are selected. For sample of normal firm, 83 firms (with same item or same business as failed firm) that are listed on KOSDAQ market and perform normal business activities during the same period (from 2009 to 2012) are selected. This study selected 80 financial ratios for 5 years immediately preceding from delisting of sample firm above and conducted T-test to derive 19 of them which emerged for five consecutive years among significant variables and used forward selection to estimate logistic regression model. While the precedent studies only analyzed the data of three years immediately preceding the delisting, this study analyzes data of five years immediately preceding the delisting. This study is distinct from existing previous studies that it researches which significant financial characteristic influences the insolvency from the initial phase of insolvent firm with time lag and it also empirically analyzes the usefulness of data by building a firm's fail prediction model which considered embezzlement/malpractice and the largest shareholder changes as dummy variable(non-financial characteristics). The accuracy of classification of the prediction model with dummy variable appeared 95.2% in year T-1, 88.0% in year T-2, 81.3% in year T-3, 79.5% in year T-4, and 74.7% in year T-5. It increased as year of delisting approaches and showed generally higher the accuracy of classification than the results of existing previous studies. This study expects to reduce the damage of not only the firm but also investors, financial institutions and other stakeholders by finding the firm with high potential to fail in advance.

  • PDF

A Study on Delinquents of Korean Army Prisoners (한국 육군 범죄자에 대한 연구)

  • Kang, Jae-Bok
    • Journal of Preventive Medicine and Public Health
    • /
    • v.10 no.1
    • /
    • pp.118-124
    • /
    • 1977
  • The features of crimes, their causes and backgrounds of 70 army delinquents, comparing with the controls, were studied from Nov. 1st, 1976 to Nov. 20, 1976 The results were as follows: 1. Most of the delinquents were from the adverse circumstances i. e. low education level, poor economic status, farmers and had got married. 2. The majority of the delinquents occurred within the first 2 years of the enlistment. 3. The rate of the parent-loss of the criminals was definitely higher than that of the controls. (48.6%) 4. Escapers from military service were over the half of them, and violence, steal and embezzlement were followed. The motivations of the escape from the military service was mostly domestic problem and illness; but a lot of the criminals also escaped for amusement and pleasure. 5. The prognosis of them was relatively favorable and constructive.

  • PDF

Real Estate Double Contract and It's Prevention (부동산 이중매매와 그 예방)

  • Park, Jong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.325-332
    • /
    • 2009
  • The Korean real estate transaction makes a contract after the buying and selling person concerned agreed a business condition. As for vendee, business consists of the method that I issue documents before provision and money left over provision and the registration at the same time, and register a contract deposit in vendor. However, it latent for the real estate transaction various accidents such as fraud from a contract day to time to finish a real estate registration transfer, embezzlement, double contract by the breach of trust. Nevertheless vendee comes to match vendor by an asymmetry of the information one-sidedly to the front completing a registration transfer. I may prevent stellionate by the breach of trust of vendor if I use an ESCROW system in such a responsibility blank state.

Legal Alternative plan for public servant Ethic Act (공직윤리제도 개선을 위한 법적대안)

  • Kim, Seon Il;Lee, Youn Hwan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.61-70
    • /
    • 2014
  • It has been raised a number of administrative ethic questions nevertheless of institutional strategy. It's even worse rather than solved. Especially, because of a distinctive family calture tradition that forming intimate bond, we're carrying lots of possibility of public corruption. As in the case of Busan Saving Bank recently, many of high-ranking officials are scouted to lawferm or business interest company After that this ex-officials exert their influence over government office. terminating public corruption. Lenient law enforcements as in the case of sponser prosecutor, social welfare budget embezzlement result in public distrust about anticorruption policy of government In conclutsion, for a best function of public service ethic system it's important to improve institutional problem constantly.

Review of the Supreme Court Judgement on Real Estate Nominal Trust without Intermediate Registration (부동산의 제3자간 명의신탁에 관한 대법원의 판례평석)

  • Park, Kwang-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.141-143
    • /
    • 2016
  • 2016년 5월 19일 대법원은 전원합의체판결에서 부동산 매수자가 본인 명의로 소유권이전등기를 하지 않고 등기를 매도인에게서 직접 명의수탁자로 이전하는 제3자간 명의신탁(중간생략등기형 명의신탁)의 경우 명의수탁자가 신탁부동산을 임의로 처분하여도 형사처벌를 할 수 없다는 판결을 하였다. 본 논문에서는 민법과 형법의 교차영역인 명의신탁에서 민사사건의 형사화를 지양했다는 점에서 긍정적인 평가를 하지만 이에 따른 관련법의 정비를 통한 법개정을 제안한다. 즉, 명의신탁에 관한 법제 간 모순을 극복하기 위해 '부동산 실권리자명의 등기에 관한 법률'의 개정이 요구된다. 또한 부동산소유자가 그 등기명의를 타인에게 신탁하기로 하는 명의신탁약정을 맺고 그 등기명의를 명의수탁자에게 이전하는 소위 2자간 명의신탁의 경우도 비범죄화를 함으로써 법체계의 논리성과 통일성을 확보할 필요가 있다.

  • PDF

Application of RFID Tag to Food Wastes Disposal System of Cheongju City (청주시의 음식물류폐기물 처리시스템을 위한 무선주파수인식태그의 적용)

  • Lee, Sang-Wha
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.62-72
    • /
    • 2009
  • In this paper, we propose an application of RFID(Radio Frequency Identification) tag to food wastes disposal system of Cheongju city. The existing system of Cheongju city is monthly fixed amount levy system. The weak point of this system must pay a same commission in spite of each other different food wastes quantity. Also the accurate occurrence quantity of the food wastes and present condition grasp of control are impossible. It will not be able to reflect to a policy decision because does not manage the control of the food waste efficiently. On the other hand, when a food wastes measuring system using RFID is executed tag, it will manage and analyze automatically the obtained data. And collecting, transporting and handling of the food wastes come to be very easy. Also the reproduction and embezzlement of the tag are impossible. As a result of this system, it brings the decrement of the food waste. Therefore the economic effect could be come true and the food wastes is controlled environment-friendly. The food wastes disposal system using RFID tag will be able to contribute in u-city constructions with RFID/USN technology which pursues from the government.

A Study on Security Risk according to the activation of Bio-Authentication Technology (바이오 인증 기술의 활성화에 따른 보안 위험성에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.57-63
    • /
    • 2016
  • In recent years, there is growing interest in 'Fin-tech' in the domestic and international financial sector. And a variety of services in such a situation has emerged. To ensure the safety of from hacking attacks, many new technologies have been developed. These leading technology is the Bio-authentication method that you consider applying to the financial sector. Bio authentication is using biometric information. Also it is known that can cope the threat of fabrication and modifying attacks with shared and stored. However, Recently, When you look at hacking incidents of biometric data(560 million cases) in the United States Office of Personnel Management and advent of the fingerprints counterfeit technology, We can be known that should be reconsidered about the safety of bio-certification. Especially, it should be provided with a response measures for the problem of embezzlement that biometric information already been leaked. Thereby In this paper, by investigating biometric technologies and practices applied and of the vulnerability factor in many industries, it expected to be utilized in the prepared threats countermeasures in accordance with the application of the biometric authentication technology in a future.