• Title/Summary/Keyword: 디지털 성폭력

Search Result 16, Processing Time 0.017 seconds

Development and Application of Tumblr's API Permalink Automatic Extractor - Focusing on the Prevention of Secondary Damage in the Unauthorized Video - (텀블러의 API 퍼머링크(Permalink) 자동추출기 개발 및 활용방안 - 비동의 영상물 2차 피해방지 방안을 중심으로 -)

  • Oh, Wan Gyun;Jeong, Dae Yong
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.71-82
    • /
    • 2018
  • Using small cameras such as smartphones, criminals shoot secretly in public restrooms and women's changing rooms. And Revenge porn is also increasing. As a result social damage is increasing. Tumblr is an overseas service and it is very difficult to work with Tumbler on international legal cooperation and deletions. Thus In order to block the distribution of videos, victims must find and report the video URL themselves. But it's hard for victims who lack IT expertise to proceed those procedure. In this study, we automatically collect the URL of stored information and hash values of the images from API permlink of Tumbler blog. It is then saved as a document file with and presented to the victim. Through these technical methods, we can help victims report violations easily and quickly.

Convergence Effect of Mobile-Based Military WithYou Program (모바일 기반 군 위드유(WithYou) 프로그램의 융복합적 효과)

  • Woo, Chung Hee
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.355-362
    • /
    • 2021
  • This study was attempted to examine the effectiveness of mobile-based military WithYou programs. The research design was a quasi-experimental study with one group pretest-posttest design. Data were collected from 17 December to 23 December 2020. 42 and 37 members of the Air base in City C participated in the pretest and posttest, respectively. A video education program developed to inspire bystander intervention efficacy and the intention of helping peers and strangers was provided on mobile. The data collected before and after attending the program were analyzed using descriptive statistics and t-test. The results showed that mobile-based military WithYou program was effective in increasing the intention to help friends and others. Attempts to develop and apply educational content using mobile devices for military personnel will be meaningful.

Design of Sex Offender Notify App for Socially Disadvantaged (사회적 약자들을 위한 성범죄 알림이 앱 설계)

  • Cho, Kwangmoon
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.301-306
    • /
    • 2014
  • An app is designed for the socially disadvantaged related to the Sex Offense. In 2013, The Republic of Korea claimed to exterminate four social evils. The first one of social evils is sexual assault. The app proposed in this paper will be used to prevent sex offenses. People may check the news related to the sex offense and search the sex offender. People may learn simple self-defense martial arts and use guidance service to go home safely. People may use this app trying to keep safety from the potential criminals by themselves.

A Study on a Violence Recognition System with CCTV (CCTV에서 폭력 행위 감지 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • With the increased frequency of crime such as assaults and sexual violence, the reliance on CCTV in arresting criminals has increased as well. However, CCTV, which should be monitored by human labor force at all times, has limits in terms of budget and man-power. Thereby, the interest in intelligent security system is growing nowadays. Expanding the techniques of an objects behavior recognition in previous studies, we propose a system to detect forms of violence between 2~3 objects from images obtained in CCTV. It perceives by detecting the object with the difference operation and the morphology of the background image. The determinant criteria to define violent behaviors are suggested. Moreover, provable decision metric values through measurements of the number of violent condition are derived. As a result of the experiments with the threshold values, showed more than 80% recognition success rate. A future research for abnormal behaviors recognition system in a crowded circumstance remains to be developed.

Forensic study of autonomous vehicle using blockchain (블록체인을 이용한 자율주행 차량의 포렌식 연구)

  • Jang-Mook, Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.209-214
    • /
    • 2023
  • In the future, as autonomous vehicles become popular at home and abroad, the frequency of accidents involving autonomous vehicles is also expected to increase. In particular, when a fully autonomous vehicle is operated, various criminal/civil problems such as sexual violence, assault, and fraud between passengers may occur as well as the vehicle accident itself. In this case, forensics for accidents involving autonomous vehicles and accidents involving passengers in the vehicles are also about to change. This paper reviewed the types of security threats of autonomous vehicles, methods for maintaining the integrity of evidence data using blockchain technology, and research on digital forensics. Through this, it was possible to describe threats that would occur in autonomous vehicles using blockchain technology and forensic techniques for each type of accident in a scenario-type manner. Through this study, a block that helps forensics of self-driving vehicles before and after accidents by investigating forensic security technology of domestic and foreign websites to respond to vulnerabilities and attacks of autonomous vehicles, and research on block chain security of research institutes and information security companies. A chain method was proposed.

A Study on Sex Offenders Registration and Notification Act of the U.S. (미국의 성범죄자 등록 및 공개법에 관한 연구)

  • Lim, Hee;Park, Ho Jung
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.23-42
    • /
    • 2013
  • Congress enacted the sex offender registration and notification act in order to prevent sexual offenses and protect public safety in the U.S.. Namely, in 2006, the Jacob Wetterling Act and Megan's Law were integrated into the Adam Walsh Child Protection and Safety Act as a comprehensive sex offender supervision and management scheme. The AWA aims to eliminate loopholes and gaps formed by inconsistent state laws and statutes as well as to provide the federal standards for sex offender registration and notification. However, the AWA contains over-inclusive sex offender registration requirements and punishments. For this reason, the implementation of the AWA may cause problems for states, sex offenders, and citizens, both as taxpayers and as beneficiaries of the AWA. Therefore, the AWA that does not differentiate between violent and non-violent offenders should be reformed to allow law enforcement officials to focus on sex offenders convicted of violent and heinous crimes. That is, the AWA should not apply to sex offenders who are not dangerous, not likely to recidivate, and who committed non-violent crimes. In addition, because the AWA requires juvenile offenders to registrate on public notification forums, it may result in a greater risk to community safety and potential risk of reoffense. Accordingly, juvenile offenders convicted of non-violent sex offenses and not likely to recidivate will be provided appropriate treatments to be rehabilitated as members of community.