• Title/Summary/Keyword: 범죄발달

Search Result 100, Processing Time 0.03 seconds

A Research of portable devices for respond to crisis situations (위기상황 대응을 위한 포터블 기기 연구 및 설계)

  • Kim, Myoung-Soo;Chang, Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.237-238
    • /
    • 2020
  • 최근 강력범죄가 빈번하게 발생하면서 이를 예방하기 위한 방안들이 활발하게 연구되고 있다. 특히 우발적으로 일어나는 범죄는 언제 발생할지 예측할 수 없기 때문에, 이러한 위기상황이 발생했을 때 즉각적으로 대처하는 것이 필요하다. 한편 과학 기술의 발달로 개인마다 스마트폰을 소지하고 있으며, 스마트폰은 단순한 통화 기능 뿐 아니라 TV, 카메라, 인터넷 등의 다양한 기능을 제공하고 있다. 본 논문에서는 음성인식을 기반으로 하여 위기상황에 효과적으로 대처하는 기술을 제안한다. 본 논문에서 제안하는 위기상황 대응을 위한 포터블 기기를 사용한다면 위기상황이 발생했을 때 적절하게 대처할 수 있을 것으로 기대된다.

  • PDF

Anomie Social Environment and Juvenile Delinquency (아노미(Anomie)적 사회환경과 청소년 범죄: 소셜 미디어를 중심으로)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.37-44
    • /
    • 2015
  • There appears a variety forms of crime type and age in accordance with the change of social structure. In this paper it is described for combining the Anomie theory of Emile Durkheim. Anomie refers to the absence of dual standards or norms. In other words, while weakening the existing norms prevailing when the new rules has not been established. That situation would cause social chaos. Rules on the dissemination and utilization of SNS due to the development of information and communication technology undermine the social norms while online regulations are being a weak state not established. In the confusion of these norms it has been shown to increase in juvenile delinquency. Social media has characteristics such as openness, accessibility, relationships, and content diversity. The social media itself is not subject to the general mechanisms of consumption and production due to growing as a kind of organism. It has characteristic to make the most content by utilizing the users to voluntarily share information. Social media using as communication, contact and information in the youth, thus the possibility of crime is high. Social media is also direct and indirect influence on youth crime but no apparent systemic regulation of this situation.

A Study on Damage and Countermeasures of SMS Phishing (스미싱의 피해와 대응방안에 관한 연구)

  • Kim, Jang Il;Lee, Heui Seok;Kim, Ji Ung;Jung, Yong-Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.1
    • /
    • pp.71-78
    • /
    • 2015
  • Created, but the development of mobile devices to have a margin of life have appeared in the opposite forces that are considered to be the target of financial crime and attacks them. Financial crime among crimes that target the smartphone SMS phishing, phishing, pharming, phishing, etc. voice and, in particular, a phenomenon that is growing a lot of SMS phishing is by nature a text message to your mobile. Ye Jin proactive rather than post responses in order to be safe from the SMS phishing attack individuals and businesses, and asset protection is even more important in the country. For this, the SMS phishing attack detected in advance and that can block the development program, it is necessary to deploy.

Research for the Security Studies in the Universities of U. S. A. (미국 대학 시큐리티 교육내용에 관한 연구 -한국 대학교육과 비교를 중심으로-)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.35-43
    • /
    • 2011
  • In the universities of U.S.A., Criminal Justice is the interdisciplinary study of the institutions and policies that constitute the criminal justice system, as well as theories of human behavior and philosophies of justice related to the maintenance of social order, the control of crime, and the achievement of a just society. There are 103 American Universities have Criminal Justice department and they provide about 180 differents courses as a pre-requisition or optional subject in the major. The most 10 courses that those colleges adopted are Introduction to Criminal Justice, Criminal Law, Criminology, Criminal Procedures, Research Methods in Criminal Justice, Criminal Investigation, Juvenile Justice, Terrorism, Ethical Issues in Criminal Justice, Introduction to Psychology or Introduction to Sociology. Also, 10 fields more important in the major if we group together similar courses those are Criminal Justice and Procedures Sequences, Law, Justice and corrections, Theory and Methods Sequences, Homelend Security and Security Operations, Forensics and Cybercrime, Management and Administration, Police, Race and Ethnicity, General Requirements, Other Social Science Fields. The combined degree program leading to Bachelor of Arts Degree in Criminal Justice and Master in Public Administration provides a concentration in criminal justice, management, administration, and leadership. They have big different courses between USA and Korea event though they have similar educative goal and way of approach to the target in the major.

Extension of Normal Behavior Patterns for Intrusion Detection System Using Degree of Similarity (유사도를 이용한 침입 탐지 시스템에서 정상행위 패턴의 확장)

  • 정영석;위규범
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.166-169
    • /
    • 2001
  • 광범위한 인터넷의 발달은 우리의 생활을 윤택하게 해주었지만, 불법적인 침입, 자료 유출 등 범죄도 늘었다. 이에 따라 불법적인 침입을 막는 침입탐지기술도 많이 발전하게 되었다. 침입탐지기술은 크게 오용탐지방법과 비정상적인 행위 탐지 방법으로 나눌 수 있다. 본 논문에서는 비정상적인 행위 탐지 방법의 긍정적 결함을 줄이기 위한 방법으로 유사도 측정 알고리즘을 사용한 방법을 제시하고자 한다.

  • PDF

A Study on the Anti-Drone Market and Related Technology (안티드론 시장과 관련 기술에 대한 고찰)

  • Oh, Se-Jin;Jeong, Jin-Man;Lee, Jae-Min
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.99-100
    • /
    • 2017
  • 최근 이슈화되는 드론을 매개로 한 테러를 포함한 범죄 행위에 대한 예방 및 방어 기술이 발달하며 그에 따른 시장도 확대되고 있다. 본 연구는 지금 국내외 사례를 통해 어떠한 위협이 있고 관련 기술은 어떻게 발전하고 있는지 또한 관련 당국과 산업, 학계는 어떻게 준비하고 있는지 점검하고 차후 과제를 도출하는데 목적이 있다.

  • PDF

A Study on the Problems in the Use of CCTV by the Police and Some Proposals (경찰CCTV 운용상의 문제점과 개선방안)

  • Lee, Sang-Won;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.215-242
    • /
    • 2005
  • As CCTV can be an effective tool to prevent or suppress crime at low cost, they have been widesoread in developed countries. In spite of their effectiveness, they infringe some constitutional rights such as the right to privacy, the right of likeness and the right to control over personal information. The police and ward offices install CCTV in public areas to prevent crimes without a legal basis or standard. When information obtained in such a way is used as investigation data for the police or as an evidence in a court, it can cause serious trouble. To solve this problem, legal restriction on the installation of CCTV as should be clearer. Since current laws on public agencies' protection of personal information are too general, they are not effective enough to protect personal information. Therefore, Personal Information Protection Organic Act should be enacted to make a legal basis for protecting comprehensive personal information. It should be obvious who installs CCTVs, who pay for the cost and how they are managed. Before installation, the police and ward offices should obtain residents' consent through a public hearing or voting (on the range and purpose of installation), or conduct an impact assessment. During installation, CCTVs should be limited to prevent or suppress crimes, keep public order and void dangers. In case of making a sign of installation, it must specify its rights. After installation(operation/management phase), they should abide by principles of information protection and try not to infringe constitutional right. In the cognitive aspect, the police should constitutional rights must be secured although it is important to carry out their missions. The police should serve citizens and change to the police of communities. Citizens should understand that constitutional right can be infringed if public order is not maintained. When citizens cooperate with the police, they fear of crimes will decrease.

  • PDF

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.

An analysis study on the quality of article to improve the performance of hate comments discrimination (악성댓글 판별의 성능 향상을 위한 품사 자질에 대한 분석 연구)

  • Kim, Hyoung Ju;Min, Moon Jong;Kim, Pan Koo
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.71-79
    • /
    • 2021
  • One of the social aspects that changes as the use of the Internet becomes widespread is communication in online space. In the past, only one-on-one conversations were possible remotely, except when they were physically in the same space, but nowadays, technology has been developed to enable communication with a large number of people remotely through bulletin boards, communities, and social network services. Due to the development of such information and communication networks, life becomes more convenient, and at the same time, the damage caused by rapid information exchange is also constantly increasing. Recently, cyber crimes such as sending sexual messages or personal attacks to certain people with recognition on the Internet, such as not only entertainers but also influencers, have occurred, and some of those exposed to these cybercrime have committed suicide. In this paper, in order to reduce the damage caused by malicious comments, research a method for improving the performance of discriminate malicious comments through feature extraction based on parts-of-speech.

악성 코드 동향과 그 미래 전망

  • Chang, Young-Jun;Cha, Min-Seok;Jung, Jin-Sung;Cho, Si-Haeng
    • Review of KIISC
    • /
    • v.18 no.3
    • /
    • pp.1-16
    • /
    • 2008
  • 2008년으로 컴퓨터 바이러스가 제작된 지 이미 20년이라는 세월을 넘기게 되었다. 이 긴 시간 속에서 컴퓨터 바이러스는 파일 감염을 목적으로 하는 바이러스(virus)로부터 네트워크를 통한 급속한 화산을 시도하는 웜(Worm) 그리고 데이터 유출과 파괴를 목적으로 하는 트로이목마(Trojan Horse)로 발달해왔다. 최근에는 컴퓨터 사용자의 정보를 무단으로 유출하기 위한 스파이웨어(Spyware)에 이르기까지 다양한 형태로 변화를 이룩해 왔다. 이러한 다양한 형태로의 변화가 진행되는 동안에도 컴퓨터 과학의 발달에 따른 새로운 기술들을 흡수하여 더욱더 정교하고 파괴적인 기능들로 발전을 이루게 되었다. 다양한 형태와 기술적 인 발전을 거듭한 악성 코드(Malicious Code)는 컴퓨터 운영 체제, 네트워크의 발달로 이룩된 컴퓨터 과학사와 함께 하였다고 볼 수 있다. 악성 코드의 발전은 해가 갈수록 수치적인 면에서는 증가 추세를 이루고 있으며 기술적인 면에서도 더욱더 위험성을 더해 가고 있으며 그 제작 목적 또한 전통적인 기술력 과시에서 금전적인 이익을 취하기 위한 도구로 전락하고 있다. 이렇게 제작 목적의 변질로 인해 악성 코드는 인터넷 공간에서 사이버 범죄를 발생시키는 원인 중 하나로 변모하게 되었다. 본 논문에서는 이러한 발전적인 형태를 띠고 있는 악성 코드에 대해서 최근 동향을 바탕으로 어떠한 악성코드와 스파이웨어의 형태가 발견되고 있는지 그리고 최근 발견되고 있는 악성코드에서 사용되는 소프트웨어 취약점들을 살펴보고자 한다. 그리고 이러한 악성코드의 형태에 따라 향후 발생할 수 있는 새로운 악성 코드의 위협 형태도 다루어 보고자 한다.