• Title/Summary/Keyword: 범죄학

Search Result 227, Processing Time 0.024 seconds

Korean Private Security for the Academic Directivity and Security Industry for the Market Directivity (시큐리티의 학문적 지향성과 시큐리티 산업의 시장 지향성 - 한국 시큐리티의 발전현황을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.15-31
    • /
    • 2008
  • This study aims to analysis and measure on the private security for the academic directivity and security industry for the market directivity in Korea. For this study we compare and analysis the curriculum of 15 universities in Korea and the papers which were published on "Korean Security Science Review" that is a report in a professional private security. In conclusion, 269 subjects are used as instructional materials in 15 universities, thus 103 subjects for the private security and 60 for the leisure sports and first-aid treatment, 46 for the social science, 30 for the martial arts and shooting, 16 for the secretary affairs, 14 for the foreign languages. Regarding scientistic papers, 45.7% of papers for the private security of all and 14.6% for the public security, 14.6% for the criminal, and 11.6% for the terror etc. But there are any papers for the facilities guard or security in spite of the facilities guard is pivotal role in this field. The facilities guard or security, or maybe house detective, holds 80.5% of the private security market and it is important role in this industry in Korea. Besides, considering development of private security, the security market makeup the body-guard field hold 12.2%, prevention security system by censor hold 4.1%. So, this statistics show that the facilities guard lead practically the private security industry in this field, but there are any subjects for the education and any research for the paper. Thus some modification on the universities curriculum is required, also needs activity research in the facilities guard field for the development private security.

  • PDF

Psycho-Social Comparison among First Time Offenders and Repeated Offenders on Probation (보호관찰 청소년의 사회 심리적 특성 -초범과 재범군의 비교-)

  • Lee, Hee-jung;Lee, Sung Chil
    • Korean Journal of Child Studies
    • /
    • v.26 no.5
    • /
    • pp.367-377
    • /
    • 2005
  • Semi-structured in-depth interview method were used to test psycho-social comparison among first time offenders and repeated offenders. Data were analyzed by t-test and chi-square. Differences between first time offenders and repeated offenders were that there were more male offenders than female offenders, and violent and theft offenders were more than sex offenders fraud and traffic offenders; early starters were more repeated offenders than late starters; there were some variables such as runway of home, parents' caring attitude, school drop out and maladjustment affecting in repeated offenses; developmental environment of repeated offenders were more negative than first time offenders. Therefore, intervention and prevention program development of good parenting and schooling and forensic counseling focused on optimal developmental environment is needed.

  • PDF

사이버 환경에서의 보안위협

  • KIm, Ji-Hoon;Cho, Si-Haeng
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.11-20
    • /
    • 2010
  • 정보시스템과 인터넷의 발전은 모든 정보 자산의 네트워킹이 가능해짐에 따라, IT 인프라를 중심축으로 한 정보사회 발전의 견인차 역할을 하였다. 최근에는 참여 공유 개방으로 대변되는 웹 2.0 기술과 함께 가히 폭발적인 스마트폰 시장환경이 맞물리면서 "모바일 웹 2.0" 시대로의 빠른 진화를 거듭하고 있다. 하지만 그에 따른 정보사회의 역기능도 만만치 않게 나타나고 있다. 우리는 이미 해킹 및 악성코드로 인한 정보 유출 피해를 비롯하여 서비스 거부 공격으로 인한 비즈니스 연속성 침해에 이르기까지 끊이지 않는 사이버 침해사고를 겪고 있다. 본 논문에서는 진화하고 있는 악성코드에 대한 최근 동향 분석을 통해 미래 정보 사회를 주도할 소설 네트워킹 환경에서의 보안위협이 어떻게 진화해 나가고 있는지 살펴보고자 한다. 또한 사이버범죄 및 사이버전쟁의 사례 분석을 통해 사이버 보안 문제에 대한 보다 적극적인 대응책 마련이 필요하다는 사회적 인지와 인식이 확립되고 보다 강력하고 안전한 대응 체계를 위한 우리의 노력이 끊임없이 연구되길 기대해 본다.

데이터 기반 딥페이크 탐지기법에 관한 최신 기술 동향 조사

  • Kim, Jeongho;An, Jaeju;Yang, Bosung;Jung, Jooyeon;Woo, Simon S.
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.79-92
    • /
    • 2020
  • 최근 전 세계적으로 '가짜뉴스', '가짜 연예인 음란 동영상' 및 '지인 능욕'에 사용되는 인공지능 기반의 딥페이크(Deepfakes)기술이 사회적인 이슈로 대두되고 있다. 딥페이크 기술이란 딥러닝 기술을 이용해 악의적으로 조작된 음성, 영상, 이미지 등을 만들어 내는 방법으로, 인공지능 기술의 발전에 맞추어 더욱더 빠르고 정교한 생성 기술이 등장하고 있다. 이러한 딥페이크 기술은 빠른 개발 속도와 쉬운 접근성을 기반으로 다양한 범죄에 악용되고 있다. 본 논문에서는 다양한 딥페이크 생성 기술을 설명하고, 이를 효율적으로 탐지 할 수 있는 다양한 데이터 기반 딥페이크 탐지 기술의 현황을 설명한다.

The Study on The Macroeconomic Factors of Marine Crime (해상범죄의 거시경제적 요인에 관한 연구)

  • 나호수
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.8 no.2
    • /
    • pp.61-69
    • /
    • 2002
  • The relatively rapid rising trend of crime rates in marine situations leads to social concerns in Korea. This study reviews some theoretical backgrounds of the economics of crime and applies econometric models to Korean marine crimes. This research finds that there is a negative relationship between marine crime rates and unemployment rates and a positive relationship between the price level and marine crimes in Korea. The other finding results are that unemployment elasticities are higher in the 1980s and price elasticities are higher in th 1990s in comparison with the results of the other periods. This findings are incompatible with the previous theoretical researches in advanced countries. These findings show that In rapidly growing economy, marine crime occurrence is proportional to marine economic activity frequency. This result may reflect that marine crimes are different from land crimes.

  • PDF

A Study on Computer Security and Controls (Computer Security에 관한 소고 - 사고범죄예방을 중심으로 -)

  • 이종철
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

A Study on the Sectoral Spread of Arbitration in Korea: Focusing on the Introduction of Criminal Arbitration (한국중재의 분야별 확산에 관한 검토 - 형사중재의 도입을 중심으로 -)

  • Nam, Seon-Mo
    • Journal of Arbitration Studies
    • /
    • v.22 no.3
    • /
    • pp.1-23
    • /
    • 2012
  • Defamation on the Internet is a criminal offense. Of late, the damage it has been causing has grown exponentially. Here, we suggest some ideas to expand the use of arbitration in Korea. We suggest that all disputes arising in connection with current contracts be settled under the rules of conciliation and arbitration. As a countermeasure to the requirements for defamation or damages, the field of criminal arbitration regulations needs to be defined strictly. In conclusion, the UK does not make provisions for arbitration as a specific subject. With respect to foreign legislation, it is necessary to take a look at ways to expand arbitration in our country. The scale of arbitration must be expanded to allow for greater protection of criminals in exchange for their cooperation in arbitration cases and relative to the amount of the damages in dollars. There must also be detailed instructions regarding the eligibility criteria for and proper handling of these arbitration cases.

  • PDF

클라우드 컴퓨팅 환경에서의 디지털 포렌식 동향 및 전망

  • Chung, Hyunji;Lee, Sangjin
    • Review of KIISC
    • /
    • v.22 no.7
    • /
    • pp.7-13
    • /
    • 2012
  • 클라우드 컴퓨팅은 네트워크, 스토리지, 서버, 응용프로그램 등과 같은 컴퓨팅 자원에 언제든지 편리하게 접근할 수 있는 새로운 컴퓨팅 모델이다. 클라우드 컴퓨팅은 기존의 컴퓨팅 환경과 다르게 다양한 단말 기기를 통해 접속할 수 있고, 사용자의 데이터를 로컬이 아닌 원격지에 저장하며, 작업 상태를 실시간으로 업데이트한다는 특징이 있다. 클라우드 컴퓨팅 환경에서 사용자의 데이터가 원격지에 존재하고, 서비스 제공자에 의해 관리되기 때문에 데이터 보안의 관점에서 위협 요소가 있을 수 있다. 또한 범죄와 관련된 데이터가 클라우드 시스템에 저장되어 있을 수 있다. 이를 조사하기 위해서 클라우드 컴퓨팅 환경에 적합한 디지털 포렌식 조사 절차와 방법이 필요하다. 본 논문에서는 디지털 포렌식 관점에서의 클라우드 컴퓨팅에 대해 설명한다. 또한 클라우드 포렌식 기술 동향과 클라우드 컴퓨팅 환경에서 발생하는 법적 이슈 동향을 살펴본다. 이를 바탕으로 향후 클라우드 컴퓨팅 포렌식 연구 방향에 대해서 제시한다.

Extraction of core and delta Points in Fingerprint (지문에서 코아와 델타의 추출)

  • Jeong, Yang-Kwon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.13 no.1
    • /
    • pp.42-48
    • /
    • 1994
  • Recently pictorial information processing has become increasingly important So, this paper described that feature points of fingerprint used to recognize fingerprints for identification in a government or arresting criminals in an institution like a police station related to crime. We apply an algorithm based on minimization of fuzzy theory to thinning and then the image into a certain size of squares. We have got some information about cores and deltas from the data encoding Into one of the eight directional codes. We could extract about $80\%$ feature points as the result of the experiment.

  • PDF

A Study on the Rehabilitative Education in Prison Library (교도소도서관의 교화교육에 관한 연구)

  • Hong, Myung-Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.4
    • /
    • pp.199-221
    • /
    • 2003
  • This study briefly analysed the situation of rehabilitative education in Korean prisons; examined the purposes of the prison and prison library, and the relationship between the prison library and rehabilitative education; and explained the literacy, open teaming, self-directed study and higher education provided by the prison library.