• Title/Summary/Keyword: Internet Fraud

Search Result 83, Processing Time 0.039 seconds

A Study on the Blockchain 2.0 Ethereum Platform Analysis for DApp Development (DApp 개발을 위한 블록체인 2.0 이더리움 플랫폼 분석 연구)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.718-723
    • /
    • 2018
  • In a positive Internet of Medical Things (IoMT) environment, by combining the latest computer network technology with IoT technology, remote health care such as health care and monitoring is improved through the provision of quality medical information services. In this paper, we identified and compared the platforms applied with blockchain and presented the results of developing the product distribution de-centralized DApp. In the process, we developed a distribution platform that can use blockchain technology to identify product fraud, manage data, manage customers' information, prevent forgery, track transaction history, and facilitate product transactions.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.

A Study on Schemes to Case Analysis and Cope with Online Game Crimes (온라인 게임범죄의 사례분석과 대응방안)

  • Yoo Yong-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.85-97
    • /
    • 2006
  • Schemes to case analysis and cope with on-line game crimes net supervision system, a real name confirmation process, and a self-examination system to check by themselves if they are addicted to on-line games with a view to prevent the addiction. In addition, this study found that general precuations should comprise measures to change the awareness of the users of the internet and to establish their ethical senses because most on-line garners are not aware that their actions are a crime and believe their crimes are not disclosed to the outsiders.

  • PDF

A Study on Voice Phishing Countermeasures of the Police (보이스피싱에 대한 경찰의 대응방안에 관한 연구)

  • Kim, Duck-Yong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.193-198
    • /
    • 2018
  • In Korea, the penetration rate of Internet, telephone and smart devices is reaching the highest level in the world. Cyber financial crimes that exploit such infrastructures continue to evolve. Since the first Voice Phishing crime in May 2006, ten years later, there has been a constant occurrence of Voice Phishing crime. Voice Phishing is a crime in which a victim is phoned for false information to figure out the victim's account number and password. This method of Voice Phishing evolves day by day, and it is difficult to investigate. Most of Voice Phishing is a form of international organized crime that is based in Southeast Asia such as China, and it is not easy to eradicate by international cooperation investigation. The purpose of this study is to investigate the actual situation and case analysis of Voice Phishing crime, and to propose the countermeasures against police Voice Phishing counterplan.

A Study on Fraud and Prevention in Internet Trade (인터넷무역 사기(詐欺)와 예방(豫防)에 관한 연구(硏究))

  • Shin, Seung-Kwan;Lee, Sang-Jin
    • International Commerce and Information Review
    • /
    • v.3 no.1
    • /
    • pp.69-81
    • /
    • 2001
  • 인터넷무역은 Global Marketing이 가능하고 거래처 발굴이 용이하기 때문에 저렴하고 손 쉽게 무역기회를 창출할 수 있다. 그러나 이러한 장점과 동시에 인터넷은 수많은 경로를 통해 정보를 전달하거나 수신되기 때문에 검증되지 않은 정보를 접할 가능성이 높고 익명과 비대면(非對面)으로 이루어지기 때문에 이를 통해 발생하는 리스크도 커지게 된다. 특히 IMF 이후 해외바이어들이 내수시장 침체를 만회하기 위한 국내 업체들의 수출확대 심리를 이용하여 외상으로 상품을 받은 후 대금을 지불하지 않는 등 인터넷을 통한 무역사기가 급증하고 있다. 본 연구에서는 인터넷무역 피해사례를 살며보고 이를 통해 피해 발생원인을 분석하고 사기예방을 위한 몇 가지 방안을 제시하고 있다. 인터넷무역 피해는 인터넷의 특성에 기인한 바가 없지 않으나 상당 부분이 무역업체들의 노력 부족에 기인하고 있다. 따라서 사기예방을 위해서는 제도적인 접근도 중요하나 무엇보다 무역업체 스스로 세심한 주의와 철저한 사전작업이 선행되어야 할 것이다.

  • PDF

Evaluation of Conversion Action Data Mechanisms in Cost-Per-Action Advertising

  • Tian, Li;Lee, Kyoung-Jun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.428-433
    • /
    • 2008
  • The online advertising industry's business model undertakes the change from CPM (cost-per-mille)-based to CPC (cost-per-click)-based. However, due to the problem of 'Click Fraud', CPA (cost-per-action) has been regarded as a new step. For CPA, publishers need to get information after a user clicks an advertisement. Therefore, in CPA, the key is to get Conversion Action Data (CAD). This paper introduces two existing mechanisms for getting CAD, compare their characteristics, and analyze their limitations. Then the two new mechanisms are introduced and their requirements and feasibility are analyzed. Lastly, we compare the existing two and the new two mechanisms, and point out each mechanism's business possibility, value and Application Area. This paper will help publishers choose the most appropriate mechanism on the basis of their situation.

  • PDF

Design of Financial Information Security Model based on Enterprise Information Security Architecture (전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계)

  • Kim, Dong Soo;Jun, Nam Jae;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.

Role Based Smart Contract For Data sharing

  • Joachim, Kweka Bruno;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.235-237
    • /
    • 2018
  • The Internet has allowed many things to move fast, including sharing of data, files and others within a second. Many domains use applications range from IoT, smart cities, healthcare, and organizations to share the data when necessary. However, there are some challenges faced by existing systems that works on centralized nature. Such challenges are data breach, trustiness issue, unauthorized access and data fraud. Therefore in this work, we focus on using a smart contract which is used by blockchain platform and works on decentralized form. Furthermore, in this work our contract provides an access to the file uploaded onto the decentralized storage such as IPFS. By leveraging smart contract-role based which consist of a contract owner who can manage the users when access the certain resources such as a file and as well as use of decentralized storage to avoid single point of failure and censorship over secure communication channel. We checked the gas cost of the smart contract since most of contracts tends to be a high cost.

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

A study on ICO-based fund investment (ICO 기반 자금 투자에 대한 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.25-32
    • /
    • 2019
  • The purpose of this study is to investigate how to make a proper investment in ICO in the market. Previously, companies used to borrow money from banks or to obtain investments from venture capital (VC) and angel investors, but now ICOs are used as a new type of funding and financing model. The ICO sells the tokens or coins created on the blockchain openly online to raise the necessary funds, and provides the market value by paying the tokens or coins as much as the investment amount. According to this study, the limitations of the ICO market are (1) difficulties in evaluating the company, (2) uncertainties in investments, (3) lack of legal safeguards, and (4) measures to secure corporate stability after recruitment. At present, there is no way to cope with this systematically since the ICO is not protected in the legal framework. Nevertheless, we investigated the ways to make proper investment in the existing ICO market. In investing in ICO, investors should (1) consider investment methods and profitability, and (2) verify and judge investment fraud through various channels (ex. Homepage, composition team profile, etc.) and make investments based on this. This study will contribute to the formation of a healthy ICO market by understanding the newly emerged ICO market and studying the considerations when investing in it, thereby contributing to the right investor training and reducing the mass production of consumer damages caused by fraud. The limitation of this study is that the domestic ICO has not yet been examined in the legal framework, so further research is needed when policy changes occur in the future.