• Title/Summary/Keyword: Money Laundering

Search Result 25, Processing Time 0.021 seconds

Democratic Deepening and Constitutional Engineering in Thailand (태국 민주주의의 심화와 헌정공학)

  • KIM, Hong Koo
    • The Southeast Asian review
    • /
    • v.23 no.1
    • /
    • pp.45-87
    • /
    • 2013
  • This paper aims to study Thai democratic deepening and the constitutional engineering with the analytical concepts of 'power sharing' and 'accountability' focusing on the 1997 and 2007 Constitution. With regard to power sharing, the 1997 Constitution had the characteristics of majoritarian principle including a two-party system, strengthening of prime minister and the executive's power etc. It enhanced significantly the aspects of accountability compared with the previous constitutions. The institutions such as Constitutional Court, Commission on Election, Administration Court, Commission on Human Right, Ombudsman, Commission on Anti-corruption, and the Measure for Anti-money Laundering were established by the 1997 Constitution. However, such empowered accountability system were often abused by the political power groups in the political process. The 2007 Constitution has the characteristics of consensual principle including a multiparty system, proportional representation system, weakened prime minister's power, balancing of cabinet and parliament's power, pushing ahead with decentralization. However, the consensual principle of the 2007 Constitution came, in part, from the factional interests. It is similar to the 1997 Constitution in terms of accountability system, which enhanced in law but abused often in practice. One of the critical reasons for the failure of the 1997 and 2007 constitutions to consolidate democratic system was the political game played around the so-called network for the monarchy composed by the military, the civilian bureaucracy, Constitutional Court and the privileged classes. The future of the Thai democratic deepening depends on the constitutional engineering in which the factional interests should be excluded, and the rules of power sharing and accountability which traditionally played around the network for the monarchy should be effectively institutionalized.

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

Research on the limiting factors and countermeasures of the virtual asset industry (가상자산 산업의 한계요인과 대응방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • The purpose of this study is to provide an environment that can support the development of the virtual asset industry. The limiting factors and countermeasures currently possessed by the virtual asset industry were considered in terms of legal and institutional aspects, technical aspects, and market aspects.Small businesses classified as virtual asset operators have difficulty meeting the government's requirements.Accordingly, SMEs with insufficient funds and manpower are withdrawn from the market, creating an environment where only large-scale enterprises with capital power survive.It is difficult to develop desirable technologies and markets in the virtual asset technology industry. In addition, small and medium-sized companies may be expelled from the market, causing damage to current users. Therefore, in terms of legal and institutional aspects, there is a lack of an exact scope of virtual asset providers, and thus it is necessary to respond to the controversial elements of virtual asset providers. In terms of technology, it is necessary to cope with the slowdown of the P2P method, the difficulty in recovering errors, and the absence of operational experts. Therefore, technology standardization and stabilization are required, and efforts must be made to cultivate operational technical personnel who can support them.In terms of the market, it is necessary to prepare measures to protect users of virtual assets and to establish countermeasures for companies operating virtual assets against weak user protection, inadequate application of the AML method, and limitations of taxation. This study is expected to contribute to active utilization support or related policies in the virtual asset industry.

A Case Study on the Introduction and Use of Artificial Intelligence in the Financial Sector (금융권 인공지능 도입 및 활용 사례 연구)

  • Byung-Jun Kim;Sou-Bin Yun;Mi-Ok Kim;Sam-Hyun Chun
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.21-27
    • /
    • 2023
  • This study studies the policies and use cases of the government and the financial sector for artificial intelligence, and the future policy tasks of the financial sector. want to derive According to Gartner, noteworthy technologies leading the financial industry in 2022 include 'generative AI', 'autonomous system', 'Privacy Enhanced Computation (PEC) was selected. The financial sector is developing new technologies such as artificial intelligence, big data, and blockchain. Developments are spurring innovation in the financial sector. Data loss due to the spread of telecommuting after the corona pandemic As interests in sharing and personal information protection increase, companies are expected to change in new digital technologies. Global financial companies also utilize new digital technology to develop products or manage and operate existing businesses. I n order to promote process innovation, I T expenses are being expanded. The financial sector utilizes new digital technology to prevent money laundering, improve work efficiency, and strengthen personal information protection. are applying In the era of Big Blur, where the boundaries between industries are disappearing, the competitive edge in the challenge of new entrants In order to preoccupy the market, financial institutions must actively utilize new technologies in their work.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF