• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.024 seconds

A study on the Improvement of Private Investigators System in Korea (한국 민간조사제도의 발전방향: 시험제도와 교육훈련 중심(中心)으로)

  • Lee, Sang-Won;Park, Yun-Kyu
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.337-365
    • /
    • 2007
  • The society shows rapid change throughout various fields in the 21 century. These changes are in progress in Korea as well and the private security field is not in exception. The private security system has socially effective function by providing services, which the police cannot provide to citizen. However, it cannot be treated rightly the possibility of violation of human right during the actual action. The qualified person at least should take private investigation service considering privatization of criminal justice and considering that the Private Investigation Act submitted to the Congress could not affect its investigation authority to the citizen currently. The purpose of this study is examination of the private investigation system in Korea and other country and is presentation of its improvement. The chapter 1 composed of introduction on chapter 1, concept and service in chapter 2, private security system in other countryin chapter 3, private security system in chapter 4, problems and its improvements in chapter5, and conclusion in chapter 6. It requires not only consideration of government but also consideration of citizen and effort of both sidesto successful settlement of private security system in Korea.

  • PDF

A Study on the Balanced Regional Development Strategy through Horizontal Fiscal Equalization Systems(I) (수평적 지방재정조정제도에 의한 지역균형발전전략 연구(I))

  • Kim, Yong-Chang
    • Journal of the Korean Geographical Society
    • /
    • v.43 no.4
    • /
    • pp.580-598
    • /
    • 2008
  • Focusing on 'growing together' strategies through horizontal fiscal equalization systems, this and subsequent papers aim to suggest regional co-development strategies in which conflicts between the Seoul Metropolitan Area(SMA) and the non-SMA can be efficiently alleviated. Regarding the socio-economic relationships between the SMA and the non-SMA, there are two contradictory perspectives. One perspective is that the SMA grows at the expense of the non-SMA. The other perspective is that non-SMA's economy is somehow entirely dependent on the economic activities occurring within the SMA, which is the opposite of the former perspective. There are various forms of collaboration among local or regional governments, but the most radical solutions involve the establishment of new regional development financing method at the practical level. This paper suggests that horizontal fiscal equalization not yet introduced between same level subgovernments need to be institutionalized to promote the growing together between the SMA and the rest region of Korea.

A Study on the Establishment of the Policing Technology R&D Organization (치안과학기술 연구개발조직 설립에 관한 연구)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.59-68
    • /
    • 2015
  • Recently, the rapid development of science and technology is a new challenge and opportunity in the policing environment. In the major industrialized countries of the West presents a strategy called SMART Policing the police to strengthen police capacity in accordance with this social change and actively utilize the science and technology in policing field. In this study, we attempted to discuss our country for the establishment of security technology research and development organization. First, I propose that installed the R&D planning department at the Office of Planning and Coordination in the National Police Agency. Secondly, it is need to establish the (provisional) Police Science and Technology Center, that integrate the functions of each organization's R&D-related work. Finally, it should integrate Police Science Institute and the National Forensic Service in (provisional) Policing Technology Research Institute.

Persuasive Communication Strategy of Showhost in TV Homeshopping (TV홈쇼핑 쇼호스트의 구매설득커뮤니케이션 전략)

  • Lee, Jung-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.311-320
    • /
    • 2011
  • This study analyzed the persuasive marketing communication strategy which applied by showhost for TV homeshopping sales. Specifically, the current study focuses on the comparative analysis of tangible goods and intangible goods sales. Four sales homeshopping TV programs were selected for analysis: two overseas travel package products, one climbing clothes product and one produce of walnut. The method of rhetorical content analysis was conducted to analyze the strategy of persuasive communication. The results shows that , , were commonly used for both tangible and intangible products sales. But , , and were heavily utilized only for intangible products sales. The result of this study can contribute to provide theoretical background for future advanced research, although it has a limitation of only analyzing four sales programs.

A Modeling of Forensics for Mobile IP Spoofing Prevention (모바일 IP 스푸핑 방지를 위한 포렌식 설계)

  • Park, Sun-Hee;Yang, Dong-Il;Jin, Kwang-Youn;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.307-317
    • /
    • 2012
  • Rapid development of the IT technology and mobile communications has increasingly improved many kinds of digital devices arise, as well as the mobile technology. However, the attacks (virus, hacking and Ip spoofing etc) have also increasingly grown dogged on any region including the society security. As the visual data is prone to copy, delete and move etc, it is necessary that attesting to the integrity of forensics evidence is crucial, as well as data transmission security. This paper presents a framework model using digital forensics method and the results of its performance evaluation for mobile security. The results show that the integrity of the visual data can be obtain with high security and make a proposal refer to prevention of Mobile IP Spoofing attack using our hashing data.

The biometric authentication technology, which makes overseas trip possible without passports (여권 없이도 외국 여행이 가능한 생체 측정 인증 기술)

  • Shim, Hyun Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.88-95
    • /
    • 2012
  • The passport is not only an officially proven document in order to identify the nationalities of travelers, but also request for protections of travelers. Since the overseas trips have been increased, the uses of forged or modulated passports are also now rapidly increasing. The forged or modulated passports are mainly used by international criminal organization or offenders, who are restricted by immigration control, in order to avoid under the radar and conceal their identities. The purpose of biometric authentication technology is to define one's unique identities through the comparative analysis one's unique finger prints, iris, sweat gland, blood vessel, palm pattern, vein distribution, voice, and etc. We have been studying about applicable and possibilities of the biometric authentication technology for overseas travel without passports. In hence, we have been also collected various of technical references of using biometric authentication, and have been analyzed what is the best biometric to be alternatively used instead of passports.

  • PDF

A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header (실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법)

  • Kim, Jung-Sun;Kang, Jung-Min;Kim, Kang-San;Shin, Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.43-50
    • /
    • 2013
  • File identification and analysis is an important process of computer forensics, since the process determines which subjects are necessary to be collected and analyzed as digital evidence. An efficient file classification aids in the file identification, especially in case of copyright infringement where we often have huge amounts of files. A lot of file classification methods have been proposed by far, but they have mostly focused on classifying malicious behaviors based on known information. In copyright infringement cases, we need a different approach since our subject includes not only malicious codes, but also vast number of normal files. In this paper, we propose an efficient file classification method that relies on undocumented information in the header of the PE format files. Out method is useful in copyright infringement cases, being applied to any sort of PE format executable file whether the file is malicious, packed, mutated, transformed, virtualized, obfuscated, or not.

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

Detecting Methods of the Database Block Size for Digital Forensics (디지털 포렌식을 위한 데이터베이스 블록 크기의 탐지 기법)

  • Kim, Sunkyung;Park, Ji Su;Shon, Jin Gon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.4
    • /
    • pp.123-128
    • /
    • 2020
  • As the use of digital devices is becoming more commonplace, digital forensics techniques recover data to collect physical evidence during the investigation. Among them, the file forensics technique recovers deleted files, therefore, it can recover the database by recovering all files which compose the database itself. However, if the record is deleted from the database, the modified record contents will not be restored even if the file is recovered. For this reason, the database forensics technique is required to recover deleted records. Database forensics obtains metadata from database configuration files and recovers deleted records from data files. However, record recovery is difficult if database metadata such as block size cannot be obtained from the database. In this paper, we propose three methods for obtaining block size, which is database metadata. The first method uses the maximum size of free space in the block, and the second method uses the location where the block appears. The third method improves the second method to find the block size faster. The experimental results show that three methods can correctly find the block size of three DBMSes.

A Study on the Construction of the Automatic Summaries - on the basis of Straight News in the Web - (자동요약시스템 구축에 대한 연구 - 웹 상의 보도기사를 중심으로 -)

  • Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.4 s.62
    • /
    • pp.41-67
    • /
    • 2006
  • The writings frame and various rules based on discourse structure and knowledge-based methods were applied to construct the automatic Ext/sums (extracts & summaries) system from the straight news in web. The frame contains the slot and facet represented by the role of paragraphs, sentences , and clauses in news and the rules determining the type of slot. Rearrangement like Unification, separation, and synthesis of the candidate sentences to summary, maintaining the coherence of meanings, was carried out by using the rules derived from similar degree measurement, syntactic information, discourse structure, and knowledge-based methods and the context plots defined with the syntactic/semantic signature of noun and verb and category of verb suffix. The critic sentence were tried to insert into summary.