• Title/Summary/Keyword: 범죄위험

Search Result 227, Processing Time 0.022 seconds

A Web-based System for Real-time Monitoring of Dangerous Objects using RFID (RFID를 이용한 웹 기반의 실시간 위험물 모니터링 시스템 구축 사례)

  • Kim, Ju-Il;Lee, Woo-Jin;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.101-115
    • /
    • 2008
  • Recently in the human society, the crime using small arms has increased. Also, many accidents happen because of incomplete management of chemicals and radiation. Accordingly, it is necessary to manage dangerous objects by tracing the position of dangerous objects and rapidly providing the correct information for them. This paper presents a web-based system for real-time monitoring of dangerous objects using RFID in order to overcome the limitations and problems of current dangerous objects management techniques. In this paper, we define the architecture for web-based dangerous objects monitoring system and the scheme for storing information of a dangerous object in the RFID tag. We also implement the web-based monitoring system and present the execution result of the system. The proposed real-time monitoring system is composed of the dangerous objects monitoring server which manages information of dangerous objects and controls them, the dangerous objects monitoring middleware which is mediator between dangerous objects and the server, the RFID reader which reads information of dangerous objects from RFID tags attached to the objects and the database which stores information, status and position of dangerous object. The proposed system manages diverse dangerous objects such as small arms, radiation and harmful chemicals based on the position of them using RFID, so the user can check dangerous objects when they are checked in and checked out and the user can acquire the real-time position information of them through the system. Furthermore, the user can visually monitor dangerous objects through web browser from any where and at any time because the system is web-based system and it provides graphical user interface.

  • PDF

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

Image Surveillance System using Intelligence (지능을 이용한 영상 감시 시스템)

  • Yun, Byeong-Ju;An, Tae-Ki;Lee, Won-Jae;Song, Young-Jun;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.115-121
    • /
    • 2009
  • Today, many studies are conducted on searching for criminals in railroad stations using intelligent surveillance system. In the 1st stage, this study conducted a simulation of the system which searches for a criminal using a DB containing information on former convicts (DB on high risk former convicts), when a crime has taken place in a railroad station. Then, in the 2nd stage, this study has developed a simulation that can search for people who is wearing the same color clothes as the criminal and are found near the station, once the color of clothes of the criminal has been entered.

  • PDF

Log Acquisition of the OpenStack Platform for Cloud Forensic (클라우드 포렌식을 위한 오픈스택 플랫폼에서 로그데이터 수집)

  • Han, Su bin;Lee, Byung-Do;Shim, Jongbo;Shin, Sang Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.460-463
    • /
    • 2014
  • 클라우드 컴퓨팅의 많은 장점에도 불구하고 클라우드 컴퓨팅은 보안이슈는 줄어들지 않으며, 특히 디지털 포렌식은 실질적인 기능을 수행하기에 미비한 실정이다. 최근, 다양한 사이버 범죄가 증가하면서 클라우드 컴퓨팅 환경은 사이버 범죄에 노출되어 있으며 악의적인 공격의 위험을 가지고 있다. 클라우드 포렌식은 자원이 가상공간에 존재할 수 있고, 증거 데이터가 물리적으로 분산되어 있기 때문에 기존의 포렌식 수사와는 다르게 접근해야 한다. 또한, 클라우드 기반 포렌식에서 획득 가능한 증거 데이터에 대한 정의가 되어 있지 않아서 증거 데이터를 수집하는데 어려움을 겪는다. 이에 본 논문에서는 오픈스택 플랫폼을 이용한 클라우드 환경을 구축하고, 클라우드 플랫폼 기반 포렌식을 위해 획득 가능한 로그 데이터에 대해 정리하고, 실제 획득 가능한 로그를 수집 및 분석하고, 클라우드 컴퓨팅 플랫폼기반 포렌식의 한계점과 해결방안을 알아본다.

Enhancing industrial security of casino business by developing criminal profiling of deviant behaviors in casino (범죄 프로파일링 기법을 활용한 카지노 위반 행동 분석과 카지노 산업보안 증대 방안 연구)

  • Lee, Chang-Hun;Lee, Seung-Hoon
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.113-146
    • /
    • 2016
  • Criminal profiling is a effective and efficient measure for enhancing industrial security of casino business. Particularly, developing criminal profiling of deviant behaviors in casino will help security management to become more effective and efficient in practical ways. Unfortunately, however, there is lack of empirical profiling study in this regard. To fill the vacuum of literature on this topic, this study was purported to create offender profiles of different types of deviant behaviors in casino based on various theories and techniques in criminal profiling literature, such as investigative psychology, linkage analysis, and behavioral evidence analysis. To fulfill the purposes, this study collected behavioral evidence from 90 casino security officers in South Korea. Offenders' behavioral evidence was analyzed to develop offender profiles of seven different types of deviant behaviors, and then the profiles were compared with each profiles that security officers focus on to identify offenders during their work hours. Results showed that, first, there were unique profiles of each type of seven different categories of deviant behaviors in terms of offenders' ways of speaking and acting, their appearance and attitudes. In addition, this study found that there were some amount of gaps between actual offenders' profiles and profiles that security officers have in mind. Based on the results, this study provided policy implications in terms of managing casino industrial security, education and training for security officers, and future study on casino security.

  • PDF

A Study on Sex Offenders Registration and Notification Act of the U.S. (미국의 성범죄자 등록 및 공개법에 관한 연구)

  • Lim, Hee;Park, Ho Jung
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.23-42
    • /
    • 2013
  • Congress enacted the sex offender registration and notification act in order to prevent sexual offenses and protect public safety in the U.S.. Namely, in 2006, the Jacob Wetterling Act and Megan's Law were integrated into the Adam Walsh Child Protection and Safety Act as a comprehensive sex offender supervision and management scheme. The AWA aims to eliminate loopholes and gaps formed by inconsistent state laws and statutes as well as to provide the federal standards for sex offender registration and notification. However, the AWA contains over-inclusive sex offender registration requirements and punishments. For this reason, the implementation of the AWA may cause problems for states, sex offenders, and citizens, both as taxpayers and as beneficiaries of the AWA. Therefore, the AWA that does not differentiate between violent and non-violent offenders should be reformed to allow law enforcement officials to focus on sex offenders convicted of violent and heinous crimes. That is, the AWA should not apply to sex offenders who are not dangerous, not likely to recidivate, and who committed non-violent crimes. In addition, because the AWA requires juvenile offenders to registrate on public notification forums, it may result in a greater risk to community safety and potential risk of reoffense. Accordingly, juvenile offenders convicted of non-violent sex offenses and not likely to recidivate will be provided appropriate treatments to be rehabilitated as members of community.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

A Basic Study on the Checklists for Crime Risk Assessment in Physical Environment of the Pedestrian Passage at Residential Area (주거지역 소규모 보행로의 물리적 환경을 대상으로 한 범죄 위험도 평가 체크리스트에 관한 기초 연구)

  • Lee, You-Mi;Park, Hyeon-Ho;Kang, Boo-Seong;Sung, Gi-Ho;Lim, Dong-Hyun
    • KIEAE Journal
    • /
    • v.16 no.3
    • /
    • pp.47-55
    • /
    • 2016
  • Purpose: This study was aimed at providing the basic checklist as a means to assess the crime risk in physical environment of the pedestrian passage at residential area. Method: For this purpose, the preliminary checklists were selected according to the review of the precedent studies of checklists in exterior pedestrian passage. The usefulness and the importance of the preliminary checklists were analyzed through the seven expert group meetings, the 87 questionnaires survey of the crime experts & the architectural/urban experts, preliminary assessment and field survey. Results: The assessment categories of checklists were sorted into six types, i.e. spatial structure & function, lighting, landscaping, security facilities, other facilities and cleaning & maintenance. The 49 checklists were proposed according to the assessment categories. The final checklists were divided key checklists and general checklists based on the results of experts' weighting of each list item. There were significant differences between crime experts' weighting and architectural/urban experts' weighting in several checklists, i.e. dividing between pavements and streets, the brightness of light, white light.

The Study on Aviation Crime in Aviation Safety and Security Act of Korea ("항공안전 및 보안에 관한 법률"에 있어서 항공범죄에 관한 연구)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.1
    • /
    • pp.27-54
    • /
    • 2010
  • Soon after September 11 attacks in 2001, there were strong demands in Korea on making relevant laws and regulations on aviation security, and Korean parliament legislated "Aviation Safety and Security Act"to fulfill the demands on safety and security of aircrafts during aviation. However, the current Aviation Safety and Security Act seems to have many problems which do not meet the practical needs in Korea, because there were not enough considerations on the practical needs and extinguishable national circumstances on civil aviation system in Korea, but only regarded the relevant international conventions and foreign practices on it. In this context, it is necessary to amend several provisions in Aviation Safety and Security Act to enhance more practical efficiencies in its implementation through systematization of the provisions on crimes which may happen during aviation. In this context, this article argues two main issues. First, Article 39 of Aviation Safety and Security Act does not express whether it is possible to punish the attempt of crime of causing damage to aircraft. Therefore, regarding a principle of legality, it is impossible to punish the perpetrator even when coincidently failed to destruct or damage aircraft. In this context, this article argues that the necessity to introduce the possibility to punish the attempt of crime of causing damage to aircraft. Second, regarding Article 160 of Civil Aviation Act of Korea, current Aviation Safety and Security Act should be amended by guaranteeing the culpability of negligence of crime of causing damage to aircraft.

  • PDF