• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.03 seconds

Warrantless Searches and Seizures of Vessels at Sea (해상에서 선박에 대한 영장 없는 수색과 압수 - 미국 해안경비대(Coast Guard)의 직무집행과 관련하여 -)

  • Kim, Jong-Goo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.15 no.4
    • /
    • pp.375-383
    • /
    • 2009
  • The purpose of this study is to examine the U.S. Coast Guard's origins and powers with respect to the warrantless searches of vessels at sea. In principle, searches and seizures of vessels at sea require a warrant. However, a ship at sea may easily slip away and destroy evidence while authorities attempt to get a warrant. Thus, warrantless searches and safety inspection need to be validated because of the exigent circumstances at the sea. There are also two kinds of exceptions that justify warrantless searches at sea namely, border searhes and administrative searches. These theories in the U.S. will be useful for legislation and law enforcement related to the Korea Coast Guard's mission.

  • PDF

Estimation of Vehicle Speed using Skid Mark (스키드 마크를 이용한 자동차 속도 추정)

  • Hong, Yu-Sik;Han, Chang-Pyeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.471-474
    • /
    • 2005
  • For the purpose of objective and scientific inspection, traffic accidents should be appraised and inspected by righteous material evidences, computer simulation, and studies such as automobile engineering, traveling and collision accident dynamics, road and traffic engineering. In this paper, it displays the results of studying cases with the reasons of traffic accidents by analyzing and studying automobile kinetics, real traffic accidents and the results of in scientific and objective ways. In this paper, it is proved that with compared by dry and wet road surface condition, the transient brake time of wet condition is longer than dry road condition. Moreover, compared with unpacked road condition and packed road condition. unpacked road condition is shorter than packed road condition using computer simulation.

  • PDF

The Method of Deleted Record Recovery for MySQL MyISAM Database (MySQL MyISAM 데이터베이스의 삭제 레코드에 대한 복구 기법)

  • Noh, Woo-seon;Jang, Sung-min;Kang, Chul-hoon;Lee, Kyung-min;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.125-134
    • /
    • 2016
  • MySQL database is currently used by many users and It has gained a big market share in the database market. Even though MyISAM storage engine was used as a default storage engine before, but records recovery method does not existed. Deleted records have a high possibility for important evidence and it is almost impossible to determine that investigators manually examine large amounts of database directly. This paper suggests the universal recovery method for deleted records and presents the experimental results.

글로벌 인터넷사업자의 개인정보침해에 대한 규제 - 아바타 이론의 제안

  • Park, Whon-Il
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.21-26
    • /
    • 2011
  • 최근 들어 인터넷사업자들이 웹상에서 제공하는 새로운 서비스가 각국의 개인정보보호 법제에 저촉되는 사례가 늘고 있다 인터넷사업자들이 국경을 넘어 정보를 수집하고 이를 가공처리, 저장하는 과정에서 본인의 동의를 얻지 않거나 개인정보를 익명처리하지 않은 것이 주로 문제가 되고 있다. 본고는 국제적으로 서비스를 하고 있는 대형 인터넷사업자가 프라이버시 침해 혐의를 받고 있는 사례를 알아보고, 무엇이 문제가 되는지 쟁점을 검토하였다. 특히 현지 감독당국이 글로벌 인터넷사업자의 위법사실을 적발하였더라도 해당 사업자가 대리인이나 분신 도구를 통하여 행동한 사실이 없으면 본사에 제게를 가할 수 없는 실정이다. 사이버공간에서는 실제 위반행위자가 없더라도 중대한 개인정보를 침해하는 결과를 가져온다면 영화 <아바타>에서와 같은 해결방법을 모색해볼 수 있다. 아바타는 독자적인 사고나 판단능력이 전혀 없지만, 나비족이 사는 낙원이 지구인에 의하여 파괴될 수 있는 상황에서 아바타와 이를 조종하는 사람들이 한 몸이 되어 나비족과 힘을 합쳐 아름다운 낙원을 지켜낸다. 즉, 인터넷사업자가 국내 실재하지 않더라도 그의 활동결과로 볼 수 있는 침해행위가 발생하고, 그 결과 회복할 수 없는 피해가 발생할 우려가 있으며, 본인과 아바타를 한 몸으로 볼 수 있다면 아바타를 통해 위법행위를 저지른 본사의 책임자를 처벌할 수 있어야 한다. 만일 그 책임자를 특정할 수 없더라도 그의 감독책임이 있는 본사 법인에 책임을 물을 수 있다고 본다. 만일 법원에서 이러한 '아바타 이론'을 수용한다면 국내에서도 외국 본사에 벌금을 과하는 등 처벌이 가능할 것이다. 다만, 해당 인터넷사업자의 반발도 만만치 않을 것이므로 주요국 개인정보 감독기구는 수사정보를 교환하는 등 국제적으로 긴밀한 협조체제를 갖출 필요가 있다.

Third Party Application Analysis For Mobile Forensics Study (모바일 포렌식 연구를 위한 서드 파티 어플리케이션 분석)

  • Ryu, Jung Hyun;Park, Jong Hyuk
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.336-339
    • /
    • 2017
  • 스마트폰 서드 파티 애플리케이션에 대한 포렌식 분석은 최근 수 년 간 탐구되어야 할 새로운 영역으로 떠올랐다. 현재 스마트폰 시장은 그 규모를 측정하는 것이 무의미할 만큼 커졌으며 각 스마트폰 플랫폼의 앱(App)마켓에는 셀 수 없이 많은 서드 파티 애플리케이션이 존재한다. 모바일 포렌식 소프트웨어 도구들은 일반적으로 연락처, 문자메시지, 통화기록 등의 전형적인 데이터를 수집한다. 이러한 도구들은 서드 파티 애플리케이션이 기기 내부에 저장하는 정보들을 간과하기 쉽다. 여러 제조사 중, 애플사의 모바일 기기에 설치된 많은 서드 파티 애플리케이션은 수사에 도움이 되는 많은 정보와 관련있는 디지털 증거를 남긴다. 이런 잠재적 증거들은 기기 내부에 저장되기도 하며, 비교적 손쉬운 방법으로 법정에 제출 가능하다. 스마트폰으로 이루어지는 많은 활동은 상당 부분 서드 파티 애플리케이션으로 이루어지며, 사이버 범죄 사건의 중심에 스마트폰이 있다면 서드 파티 애플리케이션 분석을 통한 핵심 증거 획득이 사건을 해결할 가능성이 높아진다. 본 논문에서는 스마트폰에서 널리 쓰이고 있는 소셜네트워크 애플리케이션인 '인스타그램(Instagram)'에서 행해진 포렌식 분석에 초점을 맞추고, 기기는 전 세계 적으로 가장 사용자 점유율이 높은 스마트폰인 아이폰에서 이루어졌다.

A Study on the Rhetorical Expression of Scene Design in Theatre - Focused on the Analysis of Scene Design of "King Lear" - (연극 무대 공간 디자인의 수사학적 연구 - 세익스피어 작 "리어왕"의 무대 공간 디자인 사례분석을 중심으로 -)

  • Ahn, Ju-Young
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2007.05a
    • /
    • pp.176-180
    • /
    • 2007
  • The stage space in theatre for the performance of a play requires two aspects of the physical space for a play and the image as the background or the theme of a play. This research focuses on the scene design that creates the background or the theme of a play and communicates it to the audience. The scene design is composed of various design elements of space and objects as the properties of a play. Design elements and the objects are the design languages in various form; plane, three-dimensional, multi-dimensional form. These design language have the significant meaning as a sign like human language. The scene design is completed with rhetorical expression for communication in theatre. This research defines the category of meaning that design elements of scene design can create and the rhetorical expression of the scene design language. King Lear directed by Robert G. Anderson was analyzed with the category of design elements as a sign and the pattern of the rhetorical expression. The scene design for a play is completed effectively by the rhetorical expression of design elements as the design language for communication with the audience in theatre.

  • PDF

Introducing the Another Viewpoint of Dir. Kim, giduk's Auterism in the Allegory (김기덕 감독의 알레고리적 영화작가정신 고찰)

  • Kim, Sunam
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.2
    • /
    • pp.94-102
    • /
    • 2014
  • Dir. Kim, Giduk's first work is (1996) which was created a new character and episode which disregard the main trand movie. His emotion in his film is over the reallife and common sense. His emotion is attached to the primitive feeling. He is called the tererist of Korean film culture. This thesis studys on the allegory of kim, Giduk's film world by Kim, Sunam's 'Korean auterism' which discusses dir.'s film work on the base of the background of filmmaker and his view of life. And also to represent film image he used space, water, color, repeated same meaning oposition by the usual image of rhetoric.

A Study of Network Forensic for IDS (IDS 관제를 위한 네트워크 포렌식 연구)

  • Lee, Gi-Sung;No, Si-Young;Park, Sang-Joon;Lee, Jong-Chan;Lee, Seong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.467-473
    • /
    • 2011
  • The Network-packet in this Paper to ensure the integrity of the legal evidence is effect that can have is to offer an Network-forensics system. The Paper proposed Network-forensics system in the company through legal disputes accident Networking and state agency (with investigative authority) for criminal investigations in networking for the effective and correct way to present a report of user-centric services through effective awareness can be improved.

Software Montage: Filtering of Detecting Target of Similar Software for Digital Forensic Investigation (소프트웨어 몽타주: 디지털 포렌식 수사를 위한 유사 소프트웨어 탐지 대상의 필터링)

  • Park, Hee-Wan;Han, Tai-Sook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.497-501
    • /
    • 2010
  • A software montage means information that can be extracted quickly from software and includes inherent characteristics. If a montage is made from well-known programs, we can filter candidates of similar programs among the group of programs based on the montage. In this paper, we suggest software montages based on two characteristics: API calls and strings. To evaluate the proposed montages, we performed experiments to filter candidates of some similar programs to instant messenger programs. From the experiments, we confirmed that the proposed montages can be used as a forensic tool that filters a group of similar programs even when their functions are not known in advance.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF