• Title/Summary/Keyword: 범죄행동

Search Result 114, Processing Time 0.04 seconds

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory (언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로)

  • Lee, Seohyun;Lee, Saerom;Kwak, Dong-heon
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.45-64
    • /
    • 2022
  • With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.

Factors Associated with Latent Delinquent Classes among Elementary School Students (초등학생들의 잠재적 일탈집단 유형에 영향을 미치는 요인에 관한 연구)

  • Hyun, Anna
    • Korean Journal of Social Welfare Studies
    • /
    • v.40 no.1
    • /
    • pp.197-234
    • /
    • 2009
  • Typological theories of offending postulate that childhood-onset delinquents have a high likelihood of being serious and chronic offenders and that there are a distinct set of risk factors predicting early-onset antisocial behaviors. It is useful to empirically classify children into subgroups based on their deviant behaviors because it helps us to identify unique factors associated with each subgroup. Using the first two waves of the Korean Youth Panel Survey, Elementary School Data, this study aimed(a) to empirically classify 5th graders into latent delinquent subgroups, and (b) to examine the impact of individual, familiar, school, and peer factors on the latent delinquent classes. Latent class analysis yielded three latent classes based on 15 indicators of deviant behaviors - delinquent class, low-level delinquent class, & normative class. The results from multivariate multinomial logistic regression analyses revealed that being male, reporting low self-control, coming from poor family, high association with deviant peers, and being bullied increased the risk of being in the delinquent class. Moreover, low self-control, aggression, domestic violence, low level of attachment to teachers, and deviant peers independently increased the risk of being in the low-level delinquent class compared to the normative class. Based on the study findings, implications for practice as well as future studies were discussed.

Analysis and Practical Use of a $LOGFILE in Digital Forensic (디지털 포렌식 관점에서의 $LOGFILE 분석 및 활용방안)

  • Lee Dong-Eun;Byun Geun-Deok;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.412-415
    • /
    • 2006
  • 본 논문에서는 NTFS 파일시스템의 $LOGFILE을 활용하여 범인의 행동 흐름 파악 메커니즘을 제시한다. 기존에 Carrier, Brian에 의해 제시된 NTFS파일 시스템의 분석은 주로 할당되지 않은 $MFT의 분석을 통해서 이루어졌다.$^{[1]}$ 증거물을 포착하기 위해서 사용되었던 $MFT 분석 방식을 벗어나 $LOGFILE을 통해 범죄자의 파일에 대한 조작 행위의 순서를 파악한다.

  • PDF

네트워크를 보안평가를 위한 해커 및 해킹기법 수준 분류

  • 최양서;서동일;손승원
    • Review of KIISC
    • /
    • v.11 no.5
    • /
    • pp.63-77
    • /
    • 2001
  • 최근 인테넷을 이용한 각종 해킹 및 사이버 범죄가 크게 증가하고 있으나, 아직까지 공격의 주범인 해커들의 수준을 파악하지 못한 상황이다. 과거에 해커 분류를 시도한 경우가 있었지만 적용한 분류 기준은 대부분 해커들의 행동 양식이었다. 이에 본 문서에서는 해킹 수행 코드(exploit code)를 작성할 수 있는 가의 여부를 바탕으로 해커의 능력을 분류하고 그들이 사용할 수 있는 해킹 기법과 그 수준을 확인해 보도록 한다. 이러한 해커의 수준에 따른 해킹 기법 분류를 기반으로 내부망의 보안성 평가에 활용할 수 있을 것이다.

Design and Implementation of Real-time File Access Monitoring System on NT Server (멀티 유저 윈도우 환경에서의 실시간 데이터 접근 모니터링 시스템 설계 및 구현)

  • 박영철;박진섭;김형선;송영기
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.57-60
    • /
    • 2003
  • 최근 대부분의 기업 정보 범죄가 기업 내부자 소행으로 일어난다. 허가되지 않은 사용자의 불법적인 사용 및 도용은 기업 내부의 정보유출, 파괴 등 기업에 막대한 피해를 가져온다. 이런 환경에서 공용으로 사용되는 기업 정보에 대한 사용자별 파일 또는 디렉토리 접근에 대한 실시간적인 관리가 이루어져야 한다. 본 논문에서는 멀티 유저 윈도우서버의 디렉토리 및 파일에 접근하는 사용자를 실시간적으로 모니터링하고, 사용자 권한에 위배되는 행동을 모니터링하는 시스템을 설계 및 구현한다.

  • PDF

Rapid Industrialization Induced Poor Hometeaching and Increased Juvenile Delinquents in South Korea (한국에서 급격한 산업화에 따른 가정교육 부실과 청소년범죄 증가 현상)

  • Yun, Duk-Jin
    • Clinical and Experimental Pediatrics
    • /
    • v.46 no.10
    • /
    • pp.958-965
    • /
    • 2003
  • Purpose : Recently the number of juvenile delinquents have been increasing in Korea and their misdeeds were getting worse. This study was conducted to find out the basic cause of juvenile delinquency and a counterplan of overcoming this distress. Methods : The authors reviewed the statistics of the Supreme Public Prosecutors Office to know the juvenile delinquents and Korean national statistics to know the changes of family environments. The author conducted a study on the family environments between student group and juvenile delinquent group in jail, and also investigated the value judgement of middle and high school students to know the difference between the recent adolescents and the youth before 1945. Results : Nuclear families, dual-income families and divorce rates have remarkably been increased recently. All of which are considered to be the basic cause of getting worse in home teaching. It was found that the delinquent group have more defective families, poorer economic status, poorer parent's educational level than the student group, and also found that the value judgement of recent youth were quite different from that of youth before 1945. Conclusion : Industrialization have changed our home-environment rapidly which made home-teaching poorer, and the children were being insecure and melancholy, which consequently made them more abnormal youth and juvenile delinquents in Korea.

A Study on the Surveillance Camera System for Privacy Protection (프라이버시 보호를 위한 감시카메라 시스템에 관한 연구)

  • Moon, Hae-Min;Pan, Sung-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1779-1786
    • /
    • 2009
  • Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional methods on protection of privacy in surveillance camera system and then suggests an RFID-based surveillance camera system that can both watch crimes and protect privacy. The proposed system protects privacy and watches crimes using scrambling and an RFID system.

Real-Time Loitering Detection using Object Feature (객체 특징을 이용한 실시간 배회행위 검출)

  • Kim, Jin Su;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.93-98
    • /
    • 2016
  • The literal meaning of loitering is "to lingering aimlessly or as if aimless in or about a place". And most criminals show this kind of act before they actually commit crime. Therefore, detecting this kind of loitering can effectively prevent a variety of crime. In this paper, we propose a loitering-detection algorithm using the Raspberry Pi. Proposed algorithm uses an adaptive difference image to detect moving objects and morphology opening operation to enhance the accuracy of detection. The loitering- behavior is being detected by using the center of gravity of the object to see the changes of angle; and pixel movement distance to determine the height of the object. When the loitering-behavior is detected, it outputs the alarm to tell the users by using the Raspberry Pi.

An intelligent surveillance technique based on Wifi CCTV (와이파이 감시 카메라기반 지능형 방범 서비스 기술)

  • You, Jin-Sun;Kwon, Il-Young;Park, Chul;Yang, Jung-Ho;Park, Soon-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1425-1428
    • /
    • 2013
  • 이 기술은 CCTV의 본연의 목적인 범죄 예방을 좀 더 효과적이고 효율적으로 하기 위해 개발하였다. 먼저 사용 공간에 제약을 줄이기 위해 와이파이 기반의 CCTV를 사용하기로 하였다. 그리고 단순히 영상을 수집하는 것이 아니라 아래와 같은 알고리즘을 영상에 적용하여 범죄 예방을 위한 판단을 좀 더 빠르고 정확하게 할 수 있도록 하였다. 첫 번째로 배경에서 객체들을 분리한 뒤 각각의 객체들을 labeling하여 서로를 구분하였다. 그 후 특징점을 이용해 각 객체들을 추적한 뒤 객체마다 적당한 관심영역을 설정한다. 관심영역에서 색을 이용한 외부인 침입 감지기능과 객체의 속도와 방향을 이용한 폭력적인 행동 감지기능을 적용하였다. 더 나아가 사용자의 편의를 위해 서버/클라이언트 모델을 사용하여 외부인 침입이나 폭력이 감지되면 서버가 클라이언트에게 경고 메시지와 함께 현재 상태를 이미지로 보낼 수 있도록 하였고 클라이언트가 원한다면 언제든지 실시간 영상도 볼 수 있도록 하였다.

A Study on Modus Operandi of Serial Killer -Centering on Ryu Young Chul's case- (연쇄살인범 MO(Modus Operandi)에 대한 고찰 -유영철 사건을 중심으로-)

  • Oh, Yoon-Sung
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.177-200
    • /
    • 2005
  • 2004 summer, most of Korean were shocked from serial killer Ryo young chul's criminal behavior. He had kept anger to society and selected the victim randomly. He killed many females and senior persons. Korean National Police's investigation method to homicide depend on traditional homicide investigative methods. But serial killer's criminal behaviour is evolving frequently. Therefore traditional investigative method is no effective to serial homicide anymore. If traditional investigative method is old version virus vaccine, serial killer's criminal behaviour is newly appeared computer virus. Fortunately all of criminal has modus operandi independently. Any person comes into contact with an object or another persons, a cross-transfer of physical evidence happens. In the future it is impossible to escape from confrontation with serial killer. It can be prospect that more severe copycat serial killer will appear in Korean society. Based on the Ryo young chul's criminal behavior. I'll try to analyse the serial killer's modus operandi through various aspects.

  • PDF