Many researches have been done in insurance fraud as the amount and frequency of insurance fraud have been increasing continuously. In particular, the development of insurance fraud detection system using large database management techniques including data mining or link analysis based on visual method have been the main research topic in insurance fraud. However, this kinds of detection system were very ineffective to find unintentional insurance fraud happened by accident even though it was so good to find intentional and organized crime insurance fraud. Therefore, this research suggests insurance fraud as an ethical decision making and applies TPB(Theory of Planned Behavior) for the finding of reasons and prevention strategies of unintentional insurance fraud happened by accident. The results of research show that TPB is very appropriate model to explain the behavior of insurance fraud and that insurance agents force to do insurance fraud as affecting perceived behavior control. Therefore, education and pubic relations for insurance fraud are very effective for preventing insurance fraud and developing insurance service industry.
This paper is to analyze the legality in which the fraud rule allow the issuer of L/C or a court to disrupt the payment to the beneficiary under the deferred payment credit when the nominated bank for deferred payment undertaking made prepayment or negotiation before the maturity date and fraud is identified to be involved. Since the function of commercial L/C is to provide absolute assurance of payment to a beneficiary, the fraud rule based on fraud exception has been known as the negative factor which lead to the disruption of "principle of independence & abstraction" under the commercial L/C transactions. As a result, the fraud rule is necessary to limit the activities of fraudsters, but its scope must be carefully circumscribed so as not to deny commercial utility to an instrument that exists to serve as an assurance of payment. But the fraud itself has not been firmly established because it is inherently pliable in its concept. There are numerous contents to describe the application of fraud to the L/C transactions as a standard such as egregious fraud, intentional fraud, L/C fraud(omitted here), flexible fraud, and constructive fraud. And so the standard applicable to the commercial transaction as the fraud rule would be high or low depending upon the various standards of fraud.
The Journal of Korean Institute of Communications and Information Sciences
/
v.40
no.10
/
pp.1994-2005
/
2015
Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.
DEVI, Putu Nirmala Chandra;WIDANAPUTRA, Anak Agung Gde Putu;BUDIASIH, I Gusti Ayu Nyoman;RASMINI, Ni Ketut
The Journal of Asian Finance, Economics and Business
/
v.8
no.3
/
pp.1163-1169
/
2021
This study aims to obtain empirical evidence regarding the effect of the fraud pentagon theory on financial statement fraud. The novelty of this study is the use of factor analysis to consolidate the five elements of the fraud pentagon into just one factor, which, to the knowledge of the researcher, no one else has done to research the effect of pentagon fraud on financial statement fraud. This study uses both agency theory and fraud pentagon theory. The population of this study consists of state-owned companies listed on the Indonesia Stock Exchange. The research period in this study is from 2014 to 2019. The data used in this study is secondary data obtained from the company's annual financial statements. A purposive sampling technique was used to determine the research sample. The selected companies total 20. Factor analysis and simple linear regression analysis method were used as research the methods. Based on the research results, it was found that the fraud pentagon theory had a positive effect on the financial statement fraud of state-owned companies listed on the Indonesia Stock Exchange. High level of the pentagon fraud on a company leads to a higher indication of financial statement fraud.
Journal of the Korea Institute of Information Security & Cryptology
/
v.25
no.1
/
pp.173-179
/
2015
Financial fraud such as phishing have passed several years from the occurrence, in spite of the widely known through the media, regardless of the social status or age, financial fraud has occurred on an ongoing basis, the damage is not reduced. The fraud account, the person who made the account, the user is different, it is possible to avoid tracking financial channel, and is used as a receiving means for fraud money of various crimes. Efforts of financial institutions and financial supervisory institutions, it has been promoted by preparing various measures for the eradication of fraud account so far been used as a means of financial crime, the proliferation of financial fraud, opening and distribution of fraud account is a receiving means for fraud money are also increasing continuously, it is necessary to take countermeasures. In spite of the continuous crackdown of financial institutions and financial supervisory institutions, it is causing serious damage to society, analyzes the current situation of fraud account, to present an effective and aggressive countermeasure of financial institutions in this paper.
Recently, much attention in electronic financial fraud has been dramatically increased. In particular, the electronic financial fraud has been transforming to social engineering. Despite the growing interest in electronic financial fraud, few guidelines exist how to effectively avoid the serious damage from electronic financial fraud. Moreover, it is rarely investigated cases of victims from financial fraud. Therefore, the purpose of this study is to investigate why financial fraud crime victims occurs. To enhance mundane realism, we conducted Focus Group Interview(FGI) with actual victims from financial fraud crime. Drawing analysis of FGI with actual victims, we found that there are certain damage patterns. Further, we found that the reason why financial fraud crime victims occurs is optimistic biases of humans rooted in behavioral economics. Therefore, this study provides the valuable guidelines and directions to prevent electronic financial fraud based on risk and crisis management perspective. Ultimately, this study is able to help the establishment and implementation of a comprehensive electronic financial fraud prevention policy.
Purpose - The letter of credit has been playing a major role to diminish overall risks which exist among concerned parties even though there are differences such as language, culture, law, and distance. This paper reviews essence of the letter of credit and its transaction principles, as well as overall practical questions based on the L/C transaction principle. It also investigates the risk of fraud occurrences in L/C transactions and the importance of fraud prevention and preventive measures in international L/C transactions, including the Fraud Rule, which is a major topic to consider in business transactions. Design/methodology - It is considered that an importing country's concerned parties and an exporting country's concerned parties face different situations. This study employs the existing framework to identify liability, responsibility, and obligation for all concerned parties across countries. Using a quite direct measurement of principles in the letter of credit, such as principle of independence, principle of abstraction, and principle of strictness and coincidence, we studied these differences. Findings - Our main findings can be summarized as follow. The paper enhances the efficiency of the L/C payment method to provide fraud generated from L/C transactions, presentation of a theoretical framework about fraud and fraud prevention, which international trading companies should acknowledge in a material way based on fraud risk resulting from taking advantage of L/C transaction principles. Originality/value - Existing studies focus on fraud accidents in L/C transactions by taking bad advantage of the characteristics of the letter of credit without suggesting risks of fraud. This paper attempts to evaluate and provide preventive measures as a solution for fraud and risky international business in a letter of credit transaction. This area of trade studies is underexplored, both empirically and theoretically, although the issue has long been important to Korean and world community foreign trade.
The Journal of Asian Finance, Economics and Business
/
v.8
no.7
/
pp.457-468
/
2021
This study seeks to examine the effects of fraud management accounting on organizational value creation of listed firms in Thailand through internal audit function and internal audit effectiveness as the mediators of the study. In addition, governance culture and digital capability are hypothesized to affect fraud management accounting, internal audit function, and internal audit effectiveness. The 297 listed firms in Thailand are the samples of the study. The structural equation model is applied to test the research relationships. The results of the study indicate that, firstly, fraud management accounting has an effect on internal audit function, internal audit effectiveness, and organizational value creation. Secondly, internal audit function affects both internal audit effectiveness and organizational value creation. It also mediates the fraud management accounting-organizational value creation relationships. Thirdly, internal audit effectiveness affects organizational value creation and it mediates the fraud management accounting-organizational value creation relationships. Finally, governance culture affects fraud management accounting, internal audit function and internal audit effectiveness. Accordingly, executives can support, promote and enhance the applications of fraud management accounting in an organization, and utilize its concepts as the valuable tools in order to create best organizational practices and achieve their business goals in the current and future operations.
The Journal of Asian Finance, Economics and Business
/
v.9
no.1
/
pp.311-324
/
2022
The objective of this study is to examine the influence of fraud investigation on organizational performance of Thai listed companies through mediating effects of internal audit quality, accounting information transparency and financial effectiveness, and moderating effect of corporate governance. In this study, 333 Thai listed companies are the samples of the study. Both the structural equation model and multiple regression analysis are used to examine the research relationships. The results of this study show that fraud investigation has a significant influence on internal audit quality, accounting information transparency, and financial effectiveness. Internal audit quality significantly influences accounting information transparency, financial effectiveness, and organizational performance while financial effectiveness significantly influences organizational performance. Next, both internal audit quality and financial effectiveness potentially mediate the fraud investigation-organizational performance relationships. In addition, corporate governance critically moderates the fraud investigation-internal audit quality relationships and the fraud investigation-financial effectiveness relationships. In summary, fraud investigation functions as an important valuable technique of internal audit practices. As a result, businesses must build and implement a systematic fraud investigation procedure to generate and improve beneficial outcomes in the short, medium, and long term.
To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.