• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.027 seconds

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches

  • Abdullahi Aminu Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.1
    • /
    • pp.39-59
    • /
    • 2024
  • An online social network is a platform that is continuously expanding, which enables groups of people to share their views and communicate with one another using the Internet. The social relations among members of the public are significantly improved because of this gesture. Despite these advantages and opportunities, criminals are continuing to broaden their attempts to exploit people by making use of techniques and approaches designed to undermine and exploit their victims for criminal activities. The field of digital forensics, on the other hand, has made significant progress in reducing the impact of this risk. Even though most of these digital forensic investigation techniques are carried out manually, most of these methods are not usually appropriate for use with online social networks due to their complexity, growth in data volumes, and technical issues that are present in these environments. In both civil and criminal cases, including sexual harassment, intellectual property theft, cyberstalking, online terrorism, and cyberbullying, forensic investigations on social media platforms have become more crucial. This study explores the use of machine learning techniques for addressing criminal incidents on social media platforms, particularly during forensic investigations. In addition, it outlines some of the difficulties encountered by forensic investigators while investigating crimes on social networking sites.

Reinterpretation on Propertiness of Online Game Item (온라인게임 아이템의 재물성에 대한 재검토)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.153-160
    • /
    • 2013
  • Online game provides a kind of cyber money aden and game instruments, items in order to attract game users. Game users want stronger, better and higher-leveled items with competition. Demands and supplies on items are formed and the transactions are made. The problem is there happen frequently illegal behaviors in the process of transactions. Among these illegal behaviors, for using other's id and password without authorization and stealing items, rejecting to return assigned items, providing stolen item to other who knows the fact or destroying others' items, it is difficult to apply provisions on properties in the criminal code on them. Because the criminal code has a duty to prevent separation between substantial criminal behavior and regulations, it should reflect substantial cultures and values of the times. Therefore, property like items in cyber space can be considered as new property to need to be protect under the criminal code and it may be not an interpretation of expansion. The reason is it is practical and reasonable to judge whether propertiness can be established considering cyber space's unique characteristics. It is time to review propertiness of Article No. 346 according to the request of times of the digital age.

A Study of Self-Checklist for Personal Information Protection of FinTech Service: For the Simple Payment Service (핀테크 서비스의 개인정보보호 자가평가항목 개발에 관한 연구: 간편결제 서비스 중심)

  • Kang, Min Soo;Back, Seung Jo;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.77-102
    • /
    • 2015
  • FinTech service industry has been growing rapidly around the world. It has driven innovation in financial and payment service industry with different channels such as mobile based on Information and Communications Technology (ICT). However, FinTech service is vulnerable to different security threats due to use the valuable data such as personal information and financial information. It is undeniable that collection and use of those information may increase the possibility of identity theft or privacy breach. In this paper will develop a self-checklist for the Simple Payment service users (Privacy Pragmatists) who want to make a rational decision to protect their personal information. The checklist is going to let the users assess the personal information protection by performing the assessment themself when they use the service. The body of this paper is going to analyze the items of the checklist and through the analysis, will suggest a security policy for personal information protection of FinTech service.

Affordable method of video recording for ecologists and citizen-science participants

  • Yang, Eunjeong;Lee, Keesan;Ha, Jung-moon;Kim, Woojoo;Song, Ho-Kyung;Hwang, Injae;Lee, Sang-im;Jablonski, Piotr G.
    • Journal of Ecology and Environment
    • /
    • v.42 no.2
    • /
    • pp.85-89
    • /
    • 2018
  • Observations and video documentation of interactions between animals living in dens, cavities, and other enclosed spaces are difficult, but they play an important role in field biology, ecology, and conservation. For example, bird parents visiting nests and feeding their nestlings may provide crucial information for testing of ecological hypotheses and may easily attract attention of participants of citizen-science ecological and conservation projects. Because of the nest concealment of cavity-nesting birds, their behaviors in the nest can only be studied by using video surveillance. Professional wildlife surveillance systems are extremely expensive. Here, we describe an inexpensive video setup that can be constructed with relatively little effort and is more affordable than any previously described system. We anticipate that the relatively low cost of about 250 USD for a battery-operated system is an important feature for citizen-science type of projects and for applications in heavily populated areas where the potential for theft and vandalism may be high. Based on our experiences, we provide methodological advice on practical aspects of using this system in the field for ecological research on birds. We highlight the low cost, easiness of construction, and potential availability to a large number of observers taking part in wildlife monitoring projects, and we offer technical help to participants of such research projects.

Qualitative Assessment of web quality and web-activities (웹사이트 품질과 웹활동에 따른 질적성과연구)

  • Lee, Jiwon;Kang, Inwon
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.41-65
    • /
    • 2015
  • Online firms collect consumers' private information, which serves as a valuable database for marketing activities. In order to encourage consumers to provide their private information, online firms offer high quality websites for consumers who provide private information. However, identity theft, phishing, and pharming, become critical social issues, consumers started to avoid providing their private information to online firms. Thus, consumers often provide false or limited information, which lacks value for practical use for the online firms. The main issue raised in this study is to discuss how online marketing activities has influence on consumers attitude and information providing behavior. From the result, this paper found that websites reputation had greatest impact on willingness of providing information. Also this study revealed that unauthorized use is the key factor for increasing distrust and avoidance of providing information.

  • PDF

A study on hard-core users and bots detection using classification of game character's growth type in online games (캐릭터 성장 유형 분류를 통한 온라인 게임 하드코어 유저와 게임 봇 탐지 연구)

  • Lee, Jin;Kang, Sung Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1077-1084
    • /
    • 2015
  • Security issues such as an illegal acquisition of personal information and identity theft happen due to using game bots in online games. Game bots collect items and money unfairly, so in-game contents are rapidly depleted, and honest users feel deprived. It causes a downturn in the game market. In this paper, we defined the growth types by analyzing the growth processes of users with actual game data. We proposed the framework that classify hard-core users and game bots in the growth patterns. We applied the framework in the actual data. As a result, we classified five growth types and detected game bots from hard-core users with 93% precision. Earlier studies show that hard-core users are also detected as a bot. We clearly separated game bots and hard-core users before full growth.

Crime Patterns of CBD in Cheongiu City (청주시 도심의 범죄 특성)

  • 고준호
    • Journal of the Korean Geographical Society
    • /
    • v.36 no.3
    • /
    • pp.329-341
    • /
    • 2001
  • The purpose of this study focused on the distribution of crimes in Cheongju City. This study emphasized the characteristics of place and spatial pattern of crime in Central Business District(CBD). The crime core areas were delineated and explained through land-use based on fieldwork and GIS analysis For this aim. the police crime data of Cheongju Dongbu(east). Seobu(west) for 1998 were collected In which 3.909 indictable or similar offenses were reported. In this study, Included climes are murder. rape, robbery. arson, theft, burglary, assault and vandalism. Because theme crimes are related with site-specific crime. As a result. land-use patterns are often related to specific type of offenses. The climes in Cheongju City were concentrated in the CBD Most crimes were assaults and thefts Crime areas can be classified by the age of the offender Around Chungang and Pungmul Market in the CBD. the offender's ages were 30-50 dominantly Assaults and thefts were concentrated in Songan-gil(street). which is a place teen-ages and youngsters meet frequently The result of the buffering analysis with roads, explained 40% of crime within a 30m buffer area( including both sides) of a principal road The rest of the climes mainly occurred in the vicinity of narrow streets and alleys.

  • PDF

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game (소셜 네트워크 게임(SNG) 서비스의 개인정보 유출 및 보안위협 대응방안에 관한 연구)

  • Lee, Sang Won;Kim, Huy Kang;Kim, Eun Jin
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.77-88
    • /
    • 2015
  • As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.

Design and evaluation of a dissimilarity-based anomaly detection method for mobile wireless networks (이동 무선망을 위한 비유사도 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.2
    • /
    • pp.387-399
    • /
    • 2009
  • Mobile wireless networks continue to be plagued by theft of identify and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a dissimilarity-based anomaly detection method which can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, a dissimilarity is computed by a weighted dissimilarity measure. If the value of the weighted dissimilarity measure is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of other anomaly detection methods using dissimilarity measures.

  • PDF