• Title/Summary/Keyword: 범죄위험

Search Result 227, Processing Time 0.028 seconds

Study of child abuse families using logistic regression models (로지스틱회귀모형을 활용한 아동학대 가족의 연구)

  • Min, Dae Kee;Choi, Mi Kyung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.5
    • /
    • pp.1327-1336
    • /
    • 2016
  • Most cases of child abuse in South Korea are caused by parents in the family home. Currently, these types of incidents are growing. Child abuse creates irreparable damage to a child's development and its effects are prolonged. This damage can create a maladjusted adolescent and adult criminal acts. Because of this damage and the long lasting effects on a person and society as a whole, special attention needs to be paid to this pressing issue. South Korea's rapidly changing social environment has created a variety of new family forms including dual-income families and single-parent families. With the current economic downturn and accompanying employment instability, many families exist in uneasy financial and emotional states. The children in these stressful family environments are the most vulnerable and live in risk of experiencing physical or psychological abuse from their parents. In the context of significant and often difficult social changes, this study identifies the characteristics of child abuse based on family status and parental mental health.

A design and implementation of Intelligent object recognition system in urban railway (도시철도내 지능형 객체인식 시스템 구성 및 설계)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.209-214
    • /
    • 2018
  • The subway, which is an urban railway, is the core of public transportation. Urban railways are always exposed to serious problems such as theft, crime and terrorism, as many passengers use them. Especially, due to the nature of urban railway environment, the scope of surveillance is widely dispersed and the range of surveillance target is rapidly increasing. Therefore, it is difficult to perform comprehensive management by passive surveillance like existing CCTV. In this paper, we propose the implementation, design method and object recognition algorithm for intelligent object recognition system in urban railway. The object recognition system that we propose is to analyze the camera images in the history and to recognize the situations where there are objects in the landing area and the waiting area that are not moving for more than a certain time. The proposed algorithm proved its effectiveness by showing detection rate of 100% for Selected area detection, 82% for detection in neglected object, and 94% for motionless object detection, compared with 84.62% object recognition rate using existing Kalman filter.

스마트 사회의 보안위협과 정보보호 정책추진에 관한 제언

  • Lee, Gi-Ju
    • Information and Communications Magazine
    • /
    • v.30 no.1
    • /
    • pp.24-32
    • /
    • 2012
  • 우리는 지금 스마트 사회에 살아가고 있다. 언제 어디서든 스마트 디바이스를 통해 기존에 PC에서 하던 작업들을 손쉽게 하고 있다. 한편 스마트폰의 확산으로 이용자 수가 급증하고 있는 소셜네트워크 서비스(SNS)는 이용자들이 자신의 일상적인 이야기를 사이버공간에 게시함으로 인해 개인의 사생활 정보들이 노출되고, 그러한 정보들이 범죄에 악용되는 사례들이 눈에 띄게 증가하고 있다. 또한 SNS를 이용한 악성코드의 유포 및 빠른 전파 등도 새로운 보안위협으로 나타나고 있다. 그 밖에 스마트 기기를 대상으로 한 해킹 및 악성코드 감염 등 위협이 증가하고 있는 형편이다. 본고에서는 스마트 사회의 주요 보안위협을 살펴보고 미국, 유럽, 일본, 호주 등 선진국의 관련 정책 동향과 국내 정책과 실태를 분석하여 새로운 정보보호 정책 수립 방향을 제언하고자 한다. 스마트 사회 위험 요소로 가장 보편적으로 사용되고 있는 스마트폰과 스마트폰을 통해 이용되고 있는 소셜네트워크 서비스, 클라우드 서비스의 보안위협을 제기하고 최근 글로벌 이슈로 떠오르고 있는 빅 데이터 환경의 보안위협을 분석하였다. 스마트 사회의 위협을 대비하고 있는 주요국 정책을 살펴보면, 미국의 경우 사회적 합의를 바탕으로한 감시와 통제를 강화하는 정책을 추진 중에 있으며 유럽의 5개국 EU5(영국, 독일, 프랑스, 스페인, 이탈리아)는 스마트폰 위협을 중심으로 공동 대응 방안을 마련하고 있다. 일본은 스마트 워크중심의 보안대책을 강구하고 있으며 호주는 스마트 사회 보안위협에 대한 국민의 인식제고에 주력하고 있다. 국내의 경우도 스마트 사회의 보안위협에 선제적 대응을 위하여 "스마트 모바일 시큐리티 종합계획"을 수립하여 추진중에 있다. 하지만 보안 실태를 보면 스마트 사회 보안위협에 대한 이용자들의 우려는 높은 반면 기업의 보안 대책 마련에 대한 투자는 여전히 미흡한 상황이다. 향후 우리 사회가 디바이스간 융합을 넘어 모든 사물이 연결되는 초(超)연결(Hyper-Connectivity) 시대로 진화되어 가면 편리성이 증대되는 만큼 더 많은 위협에 우리의 일상이 노출되는 문제가 발생하게 될 것이다. 안전한 미래 사회로 진입하기 위해서는 보다 체계적이고 종합적인 정보보호 정책마련이 필요하다. 본고에서는 이를 위한 정책수립의 방향을 제언했다.

Type Analysis and Countermeasures of Side Effects of using Smart Phone (스마트폰 이용의 부작용 유형 분석 및 대응 방안)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2984-2994
    • /
    • 2013
  • The emergence of smart phones has brought about a revolution in introducing a computer into the palm of a hand, and this revolution has lead to a smart society that offers comfort and joy in life; however, some side effects including a smart phone syndrome have been identified on a wider and more varied scale compared with any other IT devices of the past. This paper deduced side effect types and key issues according to type focusing on risk factors in accordance with the purpose of the use of smart phones, and diagnosed social effects based on them. In addition, based on the diagnosed results, the study proposed solutions to minimize side effects in order to produce social understanding and sympathy concerning the desirable utilization of smart phones. The proposed solutions should be able to cope with visible and potential side effects systematically by helping people to utilize smart phones, which are a platform of creativity, cooperation, communications, and entertainments, in a desirable way.

A Study on Analysis of Open Source Analysis Tools in Web Service (오픈소스기반의 웹서비스 취약점 진단도구에 관한 분석)

  • Yoo, Jeong-Seok;Hong, Ji-Hoon;Jung, Jun-Kwon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.475-478
    • /
    • 2014
  • 최근 인터넷이 발전함에 따라 월드와이드웹(World Wide Web) 기반의 웹 서비스가 급격한 발전을 이루었다. 또한 이 웹 서비스를 바탕으로 다양한 컨텐츠들과 이를 이용하는 사용자의 수도 함께 증가하였다. 그러나 이와 같은 웹 서비스의 보편화가 증대될수록 이를 악용하려는 사이버 범죄 또한 비례하여 증가하고 있다. 최근에는 공격자들이 스마트폰을 대상으로 악성코드를 전파하기 위한 방법으로 웹 서비스를 활용하기 시작하면서 웹 서비스의 보안에 대한 중요성이 더욱 강조되고 있다. 이러한 웹 서비스 보안의 필요성을 인지하고, 많은 사람들이 무료로 쉽게 웹 서비스 보안취약점을 진단 할 수 있도록 여러 오픈소스 기반의 보안 취약점 진단도구가 연구, 개발되고 있다. 하지만 웹 서비스의 보안약점을 진단하는 도구의 적합성 평가 및 기능 분류가 명확하지 않아서 진단도구를 선택하고 활용함에 있어 어려움이 따른다. 본 논문에서는 OWASP에서 위험도에 따라 선정한 웹 서비스의 보안 취약점 Top 10 항목과 소프트웨어 보안약점 진단가이드 등을 통해 웹 서비스 보안 취약점을 진단하는 도구에 대한 분석 기준을 제시한다. 이후 오픈소스로 공개된 테스트 기반 취약점 탐지도구와 소스 기반 취약점 진단도구들에 대해 제시한 기준을 이용하여 분석한다. 본 논문의 분석결과로 웹 서비스의 안전성을 평가하기 위해 활용할 수 있는 진단 도구에 대한 분석정보를 제공함으로써 보다 안전한 웹 서비스의 개발과 운영에 기여할 것으로 기대한다.

A Study on the Risk of Personal Information-related Damage through the Exposure of Personal Information Documents and the Combination of pseudonym Information (개인정보 문서 노출과 가명정보 조합을 통한 개인정보 관련 피해 위험성 연구)

  • Kim, Min-Ju;Kim, Young-Eun;Lee, Jun-Min;Lee, Chang-Hyun;Ha, Jeong-Hee;Jeong, Jae-Wan;Kang, Dae-Myung;Kim, Yung-Chul;Heo, Won-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.207-210
    • /
    • 2020
  • 대부분의 공공기관과 기업에서 개인정보가 포함된 문서를 마스킹 처리하여 온라인상에 게재하고 있다. 이 때, 여러 검색 엔진에서 특정 키워드를 통한 검색 결과를 통해 개인정보가 포함된 문서들이 대량으로 노출되고 있으며 마스킹 처리가 된 정보라 하더라도 2개 이상의 부가 정보들을 조합해서 개인을 특정할 수 있는 문제가 발생할 수 있다. 이를 통해 얻은 개인정보와 개인을 특정할 수 있는 정보는 다양한 범죄 피해를 발생시킬 우려가 있다. 따라서 본 논문은 검색 엔진과 온라인상에서 노출되고 있는 개인정보가 포함된 문서들을 탐지한다. 그 후 발견된 문서들의 통계와 조사를 통해 온라인상에 노출 중인 개인정보와 가명정보 등이 초래하는 피해의 심각성을 재고하고, 대안을 제시하고자 한다.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

A Study on Tracking Method for Command and Control Framework Tools (명령 제어 프레임워크 (Command and Control Framework) 도구 추적 방안에 대한 연구)

  • Hyeok-Ju Gwon;Jin Kwak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.721-736
    • /
    • 2023
  • The Command and Control Framework was developed for penetration testing and education purposes, but threat actors such as cybercrime groups are abusing it. From a cyber threat hunting perspective, identifying Command and Control Framework servers as well as proactive responding such as blocking the server can contribute to risk management. Therefore, this paper proposes a methodology for tracking the Command and Control Framework in advance. The methodology consists of four steps: collecting a list of Command and Control Framework-related server, emulating staged delivery, extracting botnet configurations, and collecting certificates that feature is going to be extracted. Additionally, experiments are conducted by applying the proposed methodology to Cobalt Strike, a commercial Command and Control Framework. Collected beacons and certificate from the experiments are shared to establish a cyber threat response basis that could be caused from the Command and Control Framework.

Retrospect and Prospect of Medical Law 20th Anniversary (Medical Criminal Law) (의료법학 20주년 회고와 전망(의료형법 분야))

  • Ha, Tae Hoon
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.3
    • /
    • pp.47-79
    • /
    • 2019
  • The Korean Society of Law and Medicine has faithfully played the role of professional academic organizations last 20 years in terms of academic activities, accumulated achievements, diversity, professionalism, and influence on academic circles. The Korean Society of Law and Medicine and the Journal of Medical Law serve as a platform for academic information and exchange of opinions on medical law. Medical law began in the midst of increasing conflicts and disputes caused by medical malpractice and the enactment and legal coercion of medical care as pressure on medical workers. It tried to find a way to coexist with each other through the encounter and convergence of medicine and law. Medical criminal law extends from traditional crimes in the realm of life and body protection to bioethics violations caused by the development of biomedical technology, corruption and economic crime in the medical field. Medical law has evolved into a comprehensive legal area dealing with legal issues raised in medical treatment, healthcare, bioethics, and life sciences technology. On the legal side, medical law is not independent legal areas. It is overlapping with traditional law areas such as civil law, administrative law, criminal law, social law, civil and criminal procedure law. However, it is now established as a convergence study in medicine, bioethics, life science, as well as in various fields of law. It has become an area where collaboration is needed with the field of law, medicine, ethics, sociology and economics. Medical criminal law has undergone a dynamic development over the last two decades. The development of medicine and medical technology provides new and innovative methods of diagnosis and treatment. The achievements and risks of revolutionary developments in biotechnology, genetic engineering and medicine coexist. While there is a dazzling achievement that mankind has hoped for: combating disease and improving health, it also creates unwanted side effects and risks to humans. There is a need to reconsider ethical and legal principles. The discovery and development of patient identity and autonomy has changed the medical doctor-patient relationship. Furthermore, it was complicated by the triangle relationship of patients, medical doctors and insurance. Legal matters are also complicated. This is why the necessity of legislation is emerging. Criminal punishment provisions are also required. The Medical Law and Biomedical Law are systematically and coherently deformed as mosaic-based legislation that takes place whenever there are social issues, citizens' needs, and medical organizations' interests, rather than sufficient enactment and revision procedures. It needs a complete overhaul, and this is possible through interdisciplinary collaboration which is the strength of The Korean Society of Law and Medicine.

The Legal Study of Prohibited Items on Aeroplane for the Aircraft Safety and Security (항공안전보장.질서유지를 위한 항공기반입금지 물품 관리.감독에 관한 입법적 개선방안)

  • Chang, In-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.33-66
    • /
    • 2014
  • While the numbers of overseas travelers has been increased rapidly each year, the numbers of passengers in the aircraft also has continued to be increased gradually. In the mist of these increasing numbers, such accidents as threatening an aircraft safety like riot, aircraft hijacking and terrorism have happened constantly. In these circumstances, South Korean government has prescribed "Aviation on Security Act" in accordance with the Convention on International Civil Aviation and other international agreements. This act aims to prevent illegal activities and illegal items on the aircraft to ensure the safety and security of civil aviation. However, this act is not sufficiently regulating all the illegal crimes and illegal items on the flight. For the worse, there is a lack of effective supervisory capacity. Likewise, the inherent problems of the current laws relating to the prevention of the illegal items on the aircraft are appearing on the surface continually. Above all, illegal items on the aircraft are directly connected to the issue of aviation safety and security as well as a safe utilization of the flight service. Thus, when there occurs a serious accident on board, it surely would be led to a huge economic loss not mentioning the loss of lives following the accident. Therefore safety of the flight passengers cannot be guaranteed without ensuring the safety of aircraft facilities and good supervisory mechanism of illegal items on the aircraft. Accordingly, establishing a safe operation order tends to influence economy and tourism of a country in no small measure. Therefore, it is an urgent issue to settle down a reasonable and adequate supervisory regulations regarding the prevention of the illegal items on the aircraft. Consequently, in this article, I studied on a reasonal and effective mechanism to control the prevention of the illegal items and illegal acts on the aircraft in order to ensure a safety and security of civil aircraft.