• Title/Summary/Keyword: New Fraud

Search Result 75, Processing Time 0.027 seconds

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

MEAT SPECIATION USING A HIERARCHICAL APPROACH AND LOGISTIC REGRESSION

  • Arnalds, Thosteinn;Fearn, Tom;Downey, Gerard
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1245-1245
    • /
    • 2001
  • Food adulteration is a serious consumer fraud and a matter of concern to food processors and regulatory agencies. A range of analytical methods have been investigated to facilitate the detection of adulterated or mis-labelled foods & food ingredients but most of these require sophisticated equipment, highly-qualified staff and are time-consuming. Regulatory authorities and the food industry require a screening technique which will facilitate fast and relatively inexpensive monitoring of food products with a high level of accuracy. Near infrared spectroscopy has been investigated for its potential in a number of authenticity issues including meat speciation (McElhinney, Downey & Fearn (1999) JNIRS, 7(3), 145-154; Downey, McElhinney & Fearn (2000). Appl. Spectrosc. 54(6), 894-899). This report describes further analysis of these spectral sets using a hierarchical approach and binary decisions solved using logistic regression. The sample set comprised 230 homogenized meat samples i. e. chicken (55), turkey (54), pork (55), beef (32) and lamb (34) purchased locally as whole cuts of meat over a 10-12 week period. NIR reflectance spectra were recorded over the wavelength range 400-2498nm at 2nm intervals on a NIR Systems 6500 scanning monochromator. The problem was defined as a series of binary decisions i. e. is the meat red or white\ulcorner is the red meat beef or lamb\ulcorner, is the white meat pork or poultry\ulcorner etc. Each of these decisions was made using an individual binary logistic model based on scores derived from principal component or partial least squares (PLS1 and PLS2) analysis. The results obtained were equal to or better than previous reports using factorial discriminant analysis, K-nearest neighbours and PLS2 regression. This new approach using a combination of exploratory and logistic analyses also appears to have advantages of transparency and the use of inherent structure in the spectral data. Additionally, it allows for the use of different data transforms and multivariate regression techniques at each decision step.

  • PDF

MEAT SPECIATION USING A HIERARCHICAL APPROACH AND LOGISTIC REGRESSION

  • Arnalds, Thosteinn;Fearn, Tom;Downey, Gerard
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1152-1152
    • /
    • 2001
  • Food adulteration is a serious consumer fraud and a matter of concern to food processors and regulatory agencies. A range of analytical methods have been investigated to facilitate the detection of adulterated or mis-labelled foods & food ingredients but most of these require sophisticated equipment, highly-qualified staff and are time-consuming. Regulatory authorities and the food industry require a screening technique which will facilitate fast and relatively inexpensive monitoring of food products with a high level of accuracy. Near infrared spectroscopy has been investigated for its potential in a number of authenticity issues including meat speciation (McElhinney, Downey & Fearn (1999) JNIRS, 7(3), 145 154; Downey, McElhinney & Fearn (2000). Appl. Spectrosc. 54(6), 894-899). This report describes further analysis of these spectral sets using a hierarchical approach and binary decisions solved using logistic regression. The sample set comprised 230 homogenized meat samples i. e. chicken (55), turkey (54), pork (55), beef (32) and lamb (34) purchased locally as whole cuts of meat over a 10-12 week period. NIR reflectance spectra were recorded over the wavelength range 400-2498nm at 2nm intervals on a NIR Systems 6500 scanning monochromator. The problem was defined as a series of binary decisions i. e. is the meat red or white\ulcorner is the red meat beef or lamb\ulcorner, is the white meat pork or poultry\ulcorner etc. Each of these decisions was made using an individual binary logistic model based on scores derived from principal component or partial least squares (PLS1 and PLS2) analysis. The results obtained were equal to or better than previous reports using factorial discriminant analysis, K-nearest neighbours and PLS2 regression. This new approach using a combination of exploratory and logistic analyses also appears to have advantages of transparency and the use of inherent structure in the spectral data. Additionally, it allows for the use of different data transforms and multivariate regression techniques at each decision step.

  • PDF

An Activation Plan of Electronic Contract Real Estate

  • Youn, Sung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.175-182
    • /
    • 2016
  • In the 21st century knowledge and information society, Electronic Contracts made with the intention of electronic computer information networks are emerging as a new legal problem which can not be solved in the conventional legal system governing contracts. In other words, the indicator's decision determines the effect and formation of the contracts in the face-to-face or written contracts but electronic decision through computer information network is established the working process of electronic signals-electronic contracts are not only difficult to separate the decision-making process but questioned to be solved by the theory of the general legal action. Ministry of Transportation is scheduled to introduce real estate sales and lease contract using a variety of electronic devices such as computer, tablet PC, smart phones and so on without a paper contract. This system is conducted to global expansion of Seoul in demonstration zone on May 8, 2016 and will be implemented nationwide in the second half of 2017. Electronics contract Real estate has some benefits because made by linking electronic contract system and the electronic registration system - the economic effects discounts on various kinds of fees, the prevention from real estate fraud beforehand and the solution to the complexity of the process the seller and the buyer visits The Real estate agency. However, it has some problem- the disorder in the real estate contract market, the occurrence of the real estate agency accident and the author of the electronic real estate contracts have limited only to realtor. In this paper, I suggest the activation plan to search for establishment and effect of electronic contracts and declaration of intention in electronic depending on the Electronic Contract Real Estate system.

A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform (안드로이드 플랫폼 기반에서 스미싱 탐지 및 차단을 위한 기술적 대응체계 연구)

  • Seo, Gil-Won;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.569-575
    • /
    • 2014
  • Since 2009 the number of users of smart phones and tablet PC is growing exponentially. In particular Apple's iOS and Google's Android OS are the heart of this remarkable growth, most of smart phone and tablet PC are designed to operate based on these two OS. Such increasing use of smart devices has led to changes in the social environment that allows, without the constraints of time and place. However, such development does not supply only ease to do something, even compared to past, financial fraud and information leakage are easier than before by variety of new types of attack for example phishing, pharming, smishing and qshing. So according to this paper, analyzes for smishing attack, propose a countermeasure system of the technical way and proved its higher performance compare to the existing method.

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme

  • Kutubi, Md. Abdullah Al Rahat;Alam, Kazi Md. Rokibul;Tahsin, Rafaf;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2628-2645
    • /
    • 2017
  • This paper proposes a new offline electronic payment (e-payment) system that satisfies the major security requirements of e-payment, i.e. anonymity, unlinkability, unforgeability, double spending control, conditional traceability, and fraud prevention. The central idea is the use of Hwang et al.'s RSA-based untraceable blind signature (BS), which disables the link between the e-coin and its owner and ensures the anonymity of both the customer and the merchant. It attaches an expiration, a deposit and the transaction dates to each e-coin in order to manage the database of the bank effectively, to correctly calculate the interest on the e-coin and to aid arbitration if a dishonest customer attempts to double-spend the coin. It also ensures the anonymity of the customer as long as the coin is spent legitimately. Only when a fraudulent e-coin transaction is detected can the bank, with the help of the central authority (a trusted entity), determine the identity of the dishonest customer. The system is referred to as offline since the bank does not need to be concurrently involved in transactions between a customer and a merchant. Finally, analyses of the performance of the prototype and the primary security requirements of the proposed system are also presented.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

Development of Rapid Diagnostic Kit for Identification of Hanwoo (Korean Native Cattle) Brand Meat by Detecting BIO-TAG

  • Baek, Kyung Hoon;Park, Sung Kwon;Lee, Myung Hoon;Kim, Sung Il;Cho, Soo Hyun;Choi, Chang Bon
    • Food Science of Animal Resources
    • /
    • v.34 no.3
    • /
    • pp.339-345
    • /
    • 2014
  • This study was performed to develop a rapid immuno-assay kit, by using a specific antigen to detect Hanwoo brand meat. We selected a synthetic antigen specific to our target antibody, named BIO-TAG (Tyr-D-Ala-Phe), by utilizing a computer-based analysis and literature review. BIO-TAG tagged with adjuvant was subcutaneously injected in sheep and Hanwoo. The serum and meat juice of the immunized or non-immunized animal were then analyzed, to measure the titer of antibody by ELISA and Western blot. The amount of antibodies against the BIO-TAG increased (p<0.05) in serum by vaccination. Furthermore, meat juice from the immunized Hanwoo showed greater (p<0.05) antibody titer, compared with those from non-immunized groups. To optimze the dilution factor, we performed dot-ELISA, with various combination levels of BIO-TAG. Results from dot-ELISA showed that 2 mg/mL BIO-TAG was sufficient to distinguish the immunized meat from non-immunized groups. These results support our hypothesis that simple immunization of Hanwoo generates a sufficient amount of antibodies to be detectable in the meat juice by means of the immune-assay. Therefore, specific Hanwoo brand meat can be more precisely identified by our rapid diagnostic kit. This technology can deter possible fraud of counterfeit meat brands in the Korean domestic market with ease and rapidity; and offers a new tool that guarantees consumers high quality Hanwoo brand beef.

Molecular Identification of Korean Mountain Ginseng Using an Amplification Refractory Mutation System (ARMS)

  • In, Jun-Gyo;Kim, Min-Kyeoung;Lee, Ok-Ran;Kim, Yu-Jin;Lee, Beom-Soo;Kim, Se-Young;Kwon, Woo-Seang;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.34 no.1
    • /
    • pp.41-46
    • /
    • 2010
  • Expensive herbs such as ginseng are always a possible target for fraudulent labeling. New mountain ginseng strains have occasionally been found deep within mountain areas and commercially traded at exorbitant prices. However, until now, no scientific basis has existed to distinguish such ginseng from commonly cultivated ginseng species other than by virtue of being found within deep mountain areas. Polymerase chain reaction (PCR) analysis of the internal transcribed spacer has been shown to be an appropriate method for the identification of the most popular species (Panax ginseng) in the Panax ginseng genus. A single nucleotide polymorphism (SNP) has been identified between three newly found mountain ginseng (KGD4, KGD5, and KW1) and already established Panax species. Specific PCR primers were designed from this SNP site within the sequence data and used to detect the mountain ginseng strains via multiplex PCR. The established multiplex-PCR method for the simultaneous detection of newly found mountain ginseng strains, Korean ginseng, and foreign ginseng in a single reaction was determined to be effective. This study is the first report of scientific discrimination of "mountain ginsengs" and describes an effective method of identification for fraud prevention and for uncovering the possible presence of other, cheaper ginseng species on the market.

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.