• 제목/요약/키워드: fraud financial data

검색결과 43건 처리시간 0.022초

금융권 클라우드 도입 활성화를 위한 우선순위 과제 도출 연구 (A Study on Implementing a Priority Tasks for Invigoration of Cloud in Financial sector)

  • 박원효;장항배
    • Journal of Platform Technology
    • /
    • 제8권1호
    • /
    • pp.10-15
    • /
    • 2020
  • 언제 어디서나 손쉽게 데이터 저장·관리 및 활용·분석 등을 가능하게 하는 클라우드컴퓨팅 기술의 특성으로 공공·금융·의료 등 다양한 산업군에서 클라우드 서비스 도입이 활발히 이루어지고 있다. 특히 금융 산업은 선제적으로 클라우드 서비스를 도입하여 다양한 혁신 사례를 창출하고 있으며, 이미 해외 금융권에서는 신용리스크 분석, 금융사기 데이터 분석, 주식거래 분석 등 디지털화의 가속화를 진행하고 있다. 반면, 국내 금융권의 경우 클라우드 서비스 도입과 혁신 사례들이 저조할 뿐만 아니라 대부분 후선업무 서비스 부문에 초점이 맞춰져 있다. 데이터 저장과 관리에 대한 규제, 개인 정보 보호에 대한 규제 등 산재되어 있는 다양한 보수적인 규제 요건과 의사결정모형 개발, 보안사고 및 서비스 장애에 따른 책임소재기준 설정 등의 해결과제들로 많은 금융사들이 클라우드 서비스를 도입하는 것에 부담을 갖고 있는 상황이다. 이에 본 연구에서는 선제적 해결과제들을 도출하여 우선순위를 살펴봄으로써 국내 금융권 클라우드 도입 활성화에 기여하고자 한다.

  • PDF

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • 산경연구논집
    • /
    • 제12권12호
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

퍼지-다윈의 불량 신용 탐지 시스템 (Fuzzy Darwinian Detection of Credit Card Fraud)

  • ;김정원;정길호;최종욱
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2000년도 추계학술발표논문집 (상)
    • /
    • pp.277-280
    • /
    • 2000
  • Credit evaluation is one of the most important and difficult tasks fur credit card companies, mortgage companies, banks and other financial institutes. Incorrect credit judgement causes huge financial losses. This work describes the use of an evolutionary-fuzzy system capable of classifying suspicious and non-suspicious credit card transactions. The paper starts with the details of the system used in this work. A series of experiments are described, showing that the complete system is capable of attaining good accuracy and intelligibility levels for real data.

  • PDF

내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구 (Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats)

  • 이재용;김인석
    • 한국전자거래학회지
    • /
    • 제23권4호
    • /
    • pp.153-169
    • /
    • 2018
  • 기존의 전자금융 이상거래 분석 및 탐지기술은 전자금융 업무시스템으로부터 발생된 대량의 전자금융 거래로그를 빅데이터 기반의 저장 공간으로 수집하고, 기존 고객의 거래패턴 프로 파일링 및 다양한 사고거래를 분석한 탐지룰을 이용하여 비정상적인 이상거래를 실시간 또는 준 실시간으로 탐지하고 있다. 하지만, 정작 피해금액 규모 및 사회적 파급효과가 큰 금융회사 내부자의 전자금융 부정접속 시도 및 내부 통제환경의 우회를 통한 전자금융 이용자의 중요정보 탈취와 같은 적극적인 분석은 제대로 이루어지지 못하고 있다. 이에 본 논문에서는 금융회사의 전자금융 보안프로그램에 대한 관리 실태를 분석하고, 관리상 취약점을 악용한 내부자의 보안통제 우회사고 가능성 도출한다. 또한, 이를 효율적으로 대응하기 위하여 기존 전자금융 이상거래탐지시스템에 더불어 내부자 위협모니터링과 연계한 포괄적인 전자금융 보안관리 환경을 제시하고자 한다.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • 제12권2호
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

보이스피싱에 대한 경찰의 대응방안에 관한 연구 (A Study on Voice Phishing Countermeasures of the Police)

  • 김덕용
    • 디지털콘텐츠학회 논문지
    • /
    • 제19권1호
    • /
    • pp.193-198
    • /
    • 2018
  • 우리나라는 인터넷과 전화 및 스마트기기 보급률이 세계 최고 수준에 이르고 있다. 이러한 인프라를 악용한 사이버금융범죄는 지속적으로 발전하고 있다. 2006년 5월에 국내 최초로 보이스피싱 범죄가 발생한 이후, 10년이 지난 현재까지 보이스피싱 범죄는 지속적으로 발생하고 있다. 보이스피싱이란 피해자에게 허위의 내용으로 전화를 걸어, 피해자의 계좌번호 및 패스워드 등을 알아 내어 금전을 편취하는 범죄이다. 이러한 보이스피싱은 그 수법이 날로 진화 발전하여 수사에 어려움을 격고 있다. 보이스피싱의 대부분은 중국 등 동남아시아에 그 본거지를 두고 활동하는 국제조직범죄의 형태로써 국제협력수사에 의하지 않고는 근절이 쉽지 않다. 이에 본 연구는 보이스피싱 범죄에 대한 발생실태와 사례분석을 하고, 경찰의 보이스피싱에 대한 대응방안을 살펴본 후, 이에 대한 개선점을 제시하고자 한다.

경로분석에 의한 내부통제가 회계정보시스템에 미친 효과분석 (The Impact of Internal Control on Accounting Information Systems Bying Path-analysis method)

  • 이장형
    • Asia pacific journal of information systems
    • /
    • 제5권2호
    • /
    • pp.79-100
    • /
    • 1995
  • Internal Control(IC) comprises the plan of organization and all of the coordinating methods and measures adopted in a business to safeguard its assets, check the accuracy and reliability of its accounting data, promote operational efficiency and encourage adherence to the prescribed managerial policies. If an organization's IC is not adequate, Accounting Information System (AIS) will be vulnerable to accomplish the organizations successes. Therefore, an effective and efficient IC is essential to its successes. The purpose of this study is to analyze the impact of EDP IC on the perceived usefulness of AIS. Do the general controls indirectively affect to the usefulness of AIS through th application controls? To solve these problems, a research model and a set of hypotheses were established and empirically tested. 60 financial institutions (banks, insurance companies, security companies) agreed to participate in the study. Data were gathered through structured interviews with 60 information systems managers and 537 users of accounting information of each company. Survey forms were designed and collected from financial institutions in Seoul. Information systems' managers of financial institutions responded to questionnaire(1) which consists of a series of 70 questions related to practice and perceived importance. Questionnaire (2) was received from 537 users, who responded to series of 17 questions related to the perceived usefulness. The results of analysis are summarized below. Effects of general controls are more direct on AIS's usefulness than those of application controls. Whereas, indirect effects of application controls are geater than those of general controls. Therefore, the greater the effects of application controls on general controls, the higher the perceived usefulness of AIS. In conclusion, this study supports that the perceived usefulness of AIS is affected by IC which are composed of general controls and application controls. The results of this study has significant implication to financial institution as computer fraud potential increases. Because of global competitions, financial institutions should restructure to IC and AIS in order to take advantage of the technological progress in Information System.

  • PDF

The Availability of Forensic Accounting Application Factors to Enhance the Auditors Efficiency in Jordan

  • ABU-TAPANJEH, Abdussalam Mahmoud;AL-SARAIRAH, Tasnim Muhammad Khalaf
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권3호
    • /
    • pp.807-819
    • /
    • 2021
  • This study aims to determine the availability of forensic accounting application factors sought by auditors' representatives of Jordanian Certified Public Accounting and auditors working in the Audit Bureau. The study identifies as well the role of these application factors in enhancing the efficiency of auditors due to the increased responsibility on them in the face of various fraud cases on the one hand, and their appearance in the courts as financial experts supporting the judiciary to adjudicate financial cases on the other hand. To achieve the objectives of the study, the researchers used the descriptive analytical method because of its suitability for the nature of the research. The population of the study consisted of 433 Jordanian certified public accountants and 520 auditors working in the Audit Bureau, from which a sample of 426 was constructed. A questionnaire was developed to collect data and the Statistical Package for Social Sciences was utilized to analyze data and test hypotheses. The study found that there is a statistical difference between the responses of the two samples of the study, and it concluded a set of recommendations, which are hoped to help legislators in strengthening and developing the forensic accounting profession in Jordan.

Big Data Strategies for Government, Society and Policy-Making

  • LEE, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권7호
    • /
    • pp.475-487
    • /
    • 2020
  • The paper aims to facilitate a discussion around how big data technologies and data from citizens can be used to help public administration, society, and policy-making to improve community's lives. This paper discusses opportunities and challenges of big data strategies for government, society, and policy-making. It employs the presentation of numerous practical examples from different parts of the world, where public-service delivery has seen transformation and where initiatives have been taken forward that have revolutionized the way governments at different levels engage with the citizens, and how governments and civil society have adopted evidence-driven policy-making through innovative and efficient use of big data analytics. The examples include the governments of the United States, China, the United Kingdom, and India, and different levels of government agencies in the public services of fraud detection, financial market analysis, healthcare and public health, government oversight, education, crime fighting, environmental protection, energy exploration, agriculture, weather forecasting, and ecosystem management. The examples also include smart cities in Korea, China, Japan, India, Canada, Singapore, the United Kingdom, and the European Union. This paper makes some recommendations about how big data strategies transform the government and public services to become more citizen-centric, responsive, accountable and transparent.

윈도우 기반 악성코드 증거 수집 모듈 개선에 관한 연구 (A Study on the Improvement of the Malware Evidence Collection Module Based On Windows)

  • 허건일;박찬욱;박원형;국광호
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.61-68
    • /
    • 2010
  • 최근 경제적 이득을 얻기 위한 목적으로 개인정보 신용정보 금융정보 등을 외부로 유출하는 악성코드가 증가하고 있으며 명의도용, 금융사기 등 2차 피해 또한 급증하고 있다. 그런데 정보유출형 악성코드에 감염되었을 경우 이를 탐지하고 대응할 수 있는 악성코드 증거 수집 도구가 증거를 수집하지 못하기 때문에 보안담당자가 침해사고를 처리하는데 많은 어려움을 겪고 있다. 본 논문은 기존 윈도우 기반 악성코드 증거 수집 도구의 현황과 문제점을 분석하고 이를 개선 할 수 있는 새로운 모듈을 제시한다.