• 제목/요약/키워드: Internet Fraud

검색결과 83건 처리시간 0.025초

A Visualization Jump Lists tool for Digital Forensics of Windows

  • Weng, Shiuh-Ku;Tu, Jung-Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.221-239
    • /
    • 2020
  • In this paper, a visualization digital forensics tool, called JumpList Analyzer, is implemented. The tool can analyze the complicated Jump Lists files, and then the results are demonstrated by visualization. To compare the proposed tool with the other Jump Lists tools, the proposed tool is the only one can display the analyzed results by visualization. The visualization will help the investigators more easily to find the evidence than the other tools showing the analyzed results by texts only. In the experiment, the proposed JumpList Analyzer is demonstrated its convenience at identifying artifacts for doing digital forensics in a financial fraud case. In addition, the proposed tool can also be used to reveal the computer user's behavior or background.

부합성 분석을 통한 정보보안 평가지표 개발 (A Development of Evaluation Indicators for Information Security by Means of the Coincidence Analyses)

  • 이영규;김상훈
    • 한국IT서비스학회지
    • /
    • 제7권3호
    • /
    • pp.175-198
    • /
    • 2008
  • The wide spread of the Internet has become a momentum to promote informatization, and thus individuals, organizations, and government bodies are competitively participating in this kind of new wave. Informatization enables us not only to circulate and utilize information without any limitation but also to maximize users' benefits and convenience. On the other hand, it brings about negative effects-security incidents such as cyber terror, Internet fraud and technology leakage, etc. Evaluation on security level should precede over all the others in order to minimize damage by security incidents since it diagnoses current status on security as it is and can be used as a guideline for appropriate security management. In this study, evaluation domains, items and indicators of information security to evaluate information security are theoretically developed on the basis of critically reviewing the major existing research. And then the coincidence level(content validity, ease and reliability of evaluation) of each evaluation indicators are empirically analyzed through performing the field study of 83 information security experts.

Algorithm Design to Judge Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권2호
    • /
    • pp.50-58
    • /
    • 2019
  • The clear and specific objective of this study is to design a false news discriminator algorithm for news articles transmitted on a text-based basis and an architecture that builds it into a system (H/W configuration with Hadoop-based in-memory technology, Deep Learning S/W design for bigdata and SNS linkage). Based on learning data on actual news, the government will submit advanced "fake news" test data as a result and complete theoretical research based on it. The need for research proposed by this study is social cost paid by rumors (including malicious comments) and rumors (written false news) due to the flood of fake news, false reports, rumors and stabbings, among other social challenges. In addition, fake news can distort normal communication channels, undermine human mutual trust, and reduce social capital at the same time. The final purpose of the study is to upgrade the study to a topic that is difficult to distinguish between false and exaggerated, fake and hypocrisy, sincere and false, fraud and error, truth and false.

인터넷 광고에서 안전하고 효율적인 측정방법 (A Secure and Efficient Metering Scheme for Internet Advertising)

  • 김순석;신제용;김성권
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제29권3호
    • /
    • pp.153-160
    • /
    • 2002
  • 본 논문에서는 인터넷 광고에서 웹사이트를 방문하려는 고객과 서버들간에 상호작용을 측정하기 위한 안전하고도 효율적인 측정 방법에 관해 고려한다. 대개의 인터넷 광고는 많은 고객들과 서버들 그리고 서버들에 의해 제공되는 고객들의 수에 관한 측정 정보를 수집하는 감사 기관의 상호작용으로 이루어진다. 측정 방법은 항상 고객의 방문 횟수를 과장되게 조작하려는 서버의 악의 있는 시도라든가 측정 과정을 붕괴하려는 고객들의 시도로부터 항상 안전해야만 한다. 따라서, 본 논문에서는 여러 암호학적인 기법들에 기반하여, 안전하고 효율적이며 정확하고 강건한 측정 방법을 제안하고자 한다.

전자상거래 소비자 피해실태와 소비자보호 대책에 관한 연구 (A Study on Consumer Protection Measures and Actual State of Consumer Complaints in E-Commerce)

  • 문태현
    • 정보학연구
    • /
    • 제6권4호
    • /
    • pp.69-80
    • /
    • 2003
  • 최근 전자상거래의 발전과 함께 소비자 피해도 급증하고 있다. 본 연구결과 전자상거래 피해 품목을 보면 정보통신 기기 및 서비스 위주에서 문화용품, 의류 생활용품으로 그 품목이 다변화되는 추세를 보이고 있었고 피해유형으로는 하프플라자의 피해 등으로 인하여 물품의 미인도 및 인도지연과 관련된 소비자 피해가 1,185.3%나 급증한 것으로 나타났다. 거래분야별로 보면 현재는 인터넷쇼핑몰과 관련된 피해가 90% 이상을 차지하고 있으나 향후 인터넷콘텐츠와 관련된 피해도 증가할 것으로 예측되었다. 인터넷콘텐츠의 경우 미성년자의 게임관련 피해가 가장 많은 사례로 나타났다. 그리고 피해가 다발하는 세부품목을 보면 디지털카메라, 노트북, 인터넷게임 등의 순으로 나타났다. 따라서 피해급증 분야에 대한 소비자보호 대책과 하프플라자와 같은 사기 피해에 대한 예방 대책 마련이 시급하며 장기적으로는 사업자의 의식개선을 통한 자율적인 소비자보호 체계구축이 필요한 것으로 나타났다.

  • PDF

인터넷 윤리의식의 실태 분석 및 교육 효과 측정 (Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students)

  • 김태희;강문설
    • 한국정보통신학회논문지
    • /
    • 제14권5호
    • /
    • pp.1257-1269
    • /
    • 2010
  • 삶의 전 영역에 걸쳐서 빠르게 확산되고 있는 인터넷은 효율성과 생산성, 오락성의 편익을 제공하는 반면, 익명성과 비대면성의 매체 특성으로 인해 이를 악용한 인터넷 윤리의식이 심각한 사회문제가 되고 있다. 이에 인터넷으로 인한 부작용을 예방하고 보다 인간 중심의 인터넷 문화를 창달하기 위해 인터넷 윤리교육의 중요성이 부각되고 있다. 본 논문에서는 대학 신입생들을 대상으로 인터넷 윤리의식에 대한 실태를 조사하여 분석한 결과를 바탕으로 바람직한 인터넷 윤리교육 방안을 제안하였다. 인터넷 윤리의식 실태를 개인정보 침해, 지적 재산권 침해, 유해정보, 인터넷 대화문화, 사이버 폭력, 인터넷 중독, 인터넷 사기 등으로 분류하고 설문조사를 실시하여 분석하였다. 그리고 인터넷 윤리의식의 분석 결과를 기초로 대학생들에게 바람직한 인터넷 윤리교육 방안을 제안하였다. 제안한 인터넷 윤리교육 방안을 적용하여 인터넷 윤리 교육을 실시하고, 교육의 효과를 측정하였다. 측정한 교육의 효과를 통계적으로 검증한 결과, 제안한 인터넷 윤리교육 방안이 대학생들의 인터넷 윤리의식을 개선시키는데 효과가 있음이 확인되었다.

아이핀 대량 부정발급 사고에 대한 개선방법 연구 (A Study of the Improvement Method of I-pin Mass Illegal Issue Accident)

  • 이영교;안정희
    • 디지털산업정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

Local Scalar Trust Metrics with a Fuzzy Adjustment Method

  • Seo, Yang-Jin;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권2호
    • /
    • pp.138-153
    • /
    • 2010
  • The interactions between people who do not know each other have been greatly increased with the on-going increase of people's cyberspace activities. In this situation, there exist potential risk factors such as the possibility of fraud, so we need a method to reduce or eliminate those risk factors. Concerning this necessity, rating systems are widely used, and many trust metrics calculated from rate values that people give to each other are proposed to help them make decisions. However, the trust metrics decrease the accuracy, and this is caused by the different rating scales and ranges of each person. So, we propose a fuzzy adjustment method to solve this problem. It is possible to catch the exact meaning of the trust value that each person selects through applying fuzzy sets, which improve the accuracy of the trust metric calculated from the trust values. We have applied our fuzzy adjustment method to the TidalTrust algorithm, a representative algorithm for calculating the local scalar trust metric, and we performed an experimental evaluation with four data sets and three evaluation methods.

Dynamic Trust Model Based on Extended Subjective Logic

  • Junfeng, Tian;Jiayao, Zhang;Peipei, Zhang;Xiaoxue, Ma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3926-3945
    • /
    • 2018
  • In Jøsang's trust model, trust evaluation is obtained through operators, but there are problems with the mutuality and asymmetry of trust and the impact of event weight on trust evaluation. Trust evaluation is updated dynamically and continuously with time and the process of interactions, but it has not been reflected in Jøsang's model. Therefore, final trust evaluation is not accurate, and malicious fraud cannot be prevented effectively. This causes the success rate of interaction to be low. To solve these problems, a new dynamic trust model is proposed based on extended subjective logic (DTM-ESL). In DTM-ESL, the event weight and the mutuality of trust are fully considered, the original one-way trust relationship is extended to a two-way trust relationship, discounting and consensus operators are improved, and trust renewal is designed based on event weight. The viability and effectiveness of this new model are verified by simulation experiments.