• Title/Summary/Keyword: 모의 범죄

Search Result 129, Processing Time 0.036 seconds

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.

A Study on Influence of Terror Information on Fear of Terror (테러에 대한 정보가 두려움에 미치는 영향)

  • Kim, Sang-Woon;Cho, Seung-A
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.530-538
    • /
    • 2019
  • The purpose of this study is to examine the influence of terror information on fear of terror. This study examined how indirect delivery of terror information influence on the public's fear toward terror to identify the reason for fear toward terror and to analyze the varying influence based on the information type. Terror is an unjust way where individual or group with certain purpose use various types of violence such as murder, abduction, kidnapping, sniping, and plunder to raise social fear status and accomplish their own will. When terror occurs, many people show fear toward terror and they withdraw from all life activities due to fear. Thus, terror goes beyond creation of fear by using the violence. Instead, terror has a negative influence on people's lives in all social, economic, and cultural fields. This study examined how terror information influencing on indirect terror experience influences on the fear of terror. The result showed that both confirmed information and unconfirmed information influencing on indirect experience had significant influence on the fear of terror. Also, the result showed the unconfirmed terror information had higher influence on the fear compared to the confirmed information.

The Difference in Pupil Size Responding to Cognitive Load and Emotional Arousal Questions between Guilty and Innocent Groups (유죄 및 무죄 집단 간 인지적 부하 및 정서적 각성 질문에 따른 동공크기의 변화의 차이)

  • Cho, Ara;Kim, Kiho;Lee, Jang-Han
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.155-171
    • /
    • 2020
  • The purpose of this study is to examine the effects of emotional arousal and cognitive load on pupil diameter during a lie detection interview. The guilty group (n = 30) committed a mock crime (i.e., stealing cash) and the innocent group (n = 30) performed a mission (i.e., sending a message) in the research assistant's office. After that, their pupil size was measured using a wearable eye-tracker during the interview. The interview questions were classified with the three cognitive load, three emotional arousal, and three neutral questions. The results indicate that the main effects of group and time were not significant, but the interaction between group and time was significant. It means that when answering cognitive load questions, the guilty group showed larger increase in pupil diameter than the innocent group. The present study suggests that inducing cognitive load is more effective than inducing emotional arousal during an interview when using pupil diameter as an index of deception, and it is expected to improve the accuracy of lie detection.

  • PDF

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

A Comparative Study on Private Investigators in the United Kingdom and South Korea - Focusing on the Missing Person Investigation System - (영국과 한국의 민간조사원 비교 연구 - 실종자 조사시스템을 중심으로 -)

  • Kwak, Minjun;Choi, Yeon-Jun;NamKung, Lock
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.189-215
    • /
    • 2019
  • As modern society has become specialised and complex in all areas of politics, economy and society, it has reached a point where it is difficult to control crime with the general public power. Private security, which began to fluctuate after the 19th century, has expanded its scope to subsidise public power in various areas, sometimes beyond public power. Among these private security activities, the private investigate system has long been used to provide private investigate services that are safe from personal human rights protection and crimes. This study investigate the private investigation system in the United Kingdom and South Korea focusing on the missing person investigation system by using the qualitative content analysis of research methods. First, the results of the qualitative content analysis are described through methods such as literature reviews and interviews on how the British private investigation system and the missing persons search system are implemented. Next, the results of the content analysis are presented through the methods of literature reviews and questionnaires on how the implementation of the civilian survey in Korea and the search for missing people is proceeding. It is a very important field in both countries, and there is a very limited study, especially from a Korean perspective. Therefore, it is expected that this study will not only facilitate discussions for the successful legalisation of the private research system, but also provides a basic foundation for future research. The study of the private research system should be ongoing and periodic, not temporary. In addition, in order to introduce Korea's private survey system, the private investigation system should be developed by discovering the problems of the Private Investigation Law mentioned in this study and collecting opinions from citizens, academics and related institutions. The introduction of the private investigation system requires the connection of the efforts and interests of citizens, academia and related institutions.

A Study about the efficient Control against the sexual violence in medical area (의사의 성범죄에 대한 최근 의료법 개정법률안 검토)

  • Jeong, Baekeun
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.207-229
    • /
    • 2019
  • It is a general recognition that more serious criminal acts in a certain area of society should be given more serious condemation than the same general crimnal act. In particular, considering the purpose of the medical treatment and the trust relationship between the doctor and the patient, the sexual violence by doctor in medical field can not be placed on the same line as that of the general public. But the special legislation to solve this through criminal legal sanctions is not desirable. The basic principle of criminal law ist ultima ratio, so the principle of supplementality. It means to try to solve by all possible means and finally to enter with punishment. A flat and hasty Reaction without the considering of the speciality of medical treatment will cause serious cracking in that area. In addition, it will not be able to expect desirable results in legal practice by breaking down the legal system. Rather, administrative regulation is more efficient than punishment sanctions. But the best way is autonomous control by members of the medical area. Penalties in criminal law must make an enterance at the last, and administrative regulation should be timely intervene in specific situations through diversification. In conclusion, state interventions should be farthest in order to proceed to autonomous control of medical area.

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

Extending the Scope of License Restrictions for Medical Personnel and Limiting Fundamental Rights - Focusing on the Revision of the Medical Law - (의료인의 면허제한 범위 확대와 기본권 제한 -의료법 개정안을 중심으로-)

  • Kwon, Ohtak
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.3-30
    • /
    • 2021
  • Reasons for disqualification to restrict a medical person's license should be considered in functional and moral terms. In this sense, the grounds for disqualification of medical personnel should be expanded to include all crimes that have been declared to be "imprisonment without labor or greater punishment" by a court. Because a sentence of "imprisonment without labor or greater punishment" means that it is highly reprehensible and undermines the trust of the state as well as the trust in medical personnel. Therefore, the expansion of the scope of license restrictions for medical personnel cannot be regarded as a violation of "the Less Restrictive Alternative" rule. However, it is necessary to reflect the specificity of medical services in the license restrictions of medical personnel. This is because not all diseases can be treated with current medical services. In addition, unpredictable situations can occur at any time during medical practice. Consequently, the negligence that occurs during medical practice should be carefully examined from a functional perspective of the medical personnel. And it should be treated differently from ordinary crimes. To this end, an independent license review organization should be established to establish expertise in license management.

Counterfeit Money Detection Algorithm based on Morphological Features of Color Printed Images and Supervised Learning Model Classifier (컬러 프린터 영상의 모폴로지 특징과 지도 학습 모델 분류기를 활용한 위변조 지폐 판별 알고리즘)

  • Woo, Qui-Hee;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.889-898
    • /
    • 2013
  • Due to the popularization of high-performance capturing equipments and the emergence of powerful image-editing softwares, it is easy to make high-quality counterfeit money. However, the probability of detecting counterfeit money to the general public is extremely low and the detection device is expensive. In this paper, a counterfeit money detection algorithm using a general purpose scanner and computer system is proposed. First, the printing features of color printers are calculated using morphological operations and gray-level co-occurrence matrix. Then, these features are used to train a support vector machine classifier. This trained classifier is applied for identifying either original or counterfeit money. In the experiment, we measured the detection rate between the original and counterfeit money. Also, the printing source was identified. The proposed algorithm was compared with the algorithm using wiener filter to identify color printing source. The accuracy for identifying counterfeit money was 91.92%. The accuracy for identifying the printing source was over 94.5%. The results support that the proposed algorithm performs better than previous researches.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.