• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.023 seconds

A Study on the Relationship between Industrial Espionage, Self-Control, and Organizational Commitment (산업기술유출과 자기통제력, 조직애착도의 관계에 관한 연구)

  • Hwang, Hyun-Dong;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.119-137
    • /
    • 2016
  • In a recent period, it becomes more and more important to keep the cutting-edge industrial technology secured. This is because competitive technology appears to be a cornerstone of national power. Although the industrial espionage must be an illegal behavior or a kind of white-collar crime, there has been few researches on industrial espionage from a criminological perspective. This study investigates the relationship between industrial espionage, self-control, and organizational commitment. The hypotheses of this study were found to be statistically significant. The hypothesis 1 that the high self-control reduces the possibility of industrial espionage was accepted, and the hypothesis 2 that the high organizational commitment reduces the possibility of industrial espionage was also accepted. This results showed that self-control and organizational commitment were the key factors to prevent industrial espionage, which eventually reinforces industrial security. This study used a convenient sampling, which might be the limits of this study. By using a convenient sampling, the result of the study could not depend on representative sample. Nonetheless, this study was trying to explore the relationship between industrial espionage, self-control, and organizational commitment which was not researched yet. The purpose of this study is to contribute to find out the criminological causes of industrial espionage and eventually to prevent it.

  • PDF

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

Paralinguistic Behavior as a Deception Cue (거짓말의 단서로서 준언어행위)

  • Kim, Daejoong;Park, Jihye
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.187-196
    • /
    • 2019
  • This experimental study examines whether paralinguistic behavior is a deception cue in an interrogation. 92 college students participated in an experiment and were randomly assigned to two conditions. Participant were then asked to take the money or not to take the money according to the condition they were assigned. Then participants had a face-to-face interrogation. During the interrogation, participants' paralinguistic behavior was recorded and used for coding and analysis. Results reveal that participants' paralinguistic behaviors differ depending on question types and deceptive paralinguistic cues are speech speed and fillers for the closed critical question and response latency, response length, and fillers for the open critical question. These findings implicate that part of paralinguistic behavior could be a deception cue and thus these cues might be applicable to deception detection in real world criminal investigations.

An Analysis of Insurance Crimes: The Case of Blackmail in Automobile Accidents (보험사기범죄에 대한 분석 고의 교통사고 유도 - 합의금 요구 사건을 중심으로)

  • Yang, Chae-Yeol
    • The Korean Journal of Financial Management
    • /
    • v.23 no.1
    • /
    • pp.227-242
    • /
    • 2006
  • This paper analyzes insurance crimes using a game theoretic model. In blackmailing cases involving automobile accidents, insurance criminals deliberately induce innocent drivers(victims) to commit a moving violation such as crossing over the center dividing yellow line, and collide with the victims. After the collision, the criminals and the victims effectively engage in a bargaining game over the amount of the settlement for the damage. Because the penalty for that kind of moving violation is very severe (even criminally prosecuted), the victims do not have much bargaining power. Exploiting the weak bargaining power of the victims, the criminals demand and receive huge compensation (including settlement) from the victims. In the model, it is shown that under the current law agents have perverse incentives leading to insurance crimes. The criminals have incentive to induce car collisions and extract huge settlement from the victims. Based on the analysis, it is suggested that lowering the severity of penalty for certain kind of violation may be needed to prevent insurance crimes, in addition to increasing the crime investigation activities and strengthening punishment for insurance criminals.

  • PDF

Judgment on the Criminal Responsibility of Perpetrators with Mental Disorders and Their Mental Examination (정신장애 범죄인의 책임능력 판단과 정신감정)

  • Choi, Min-Young
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.83-107
    • /
    • 2019
  • This article focuses on §10 of Criminal Act of the Republic of Korea to discuss how to determine criminal responsibility of a perpetrator suffering from mental disorders, while reviewing existing process and standards of mental examination at each stage of the criminal procedure as well as exploring suggestions regarding how they should be complied. The determination of the sanity or criminal responsibility of the mentally ill as defined in the §10 of Criminal Act, by its nature, cannot be approached with a traditional, clear-cut dichotomy of biology by medical practitioner and psychology·normative science by lawyer. Looking into the actual procedure of determining mental and physical disorder with special consideration of mental illness reveals the inevitability of collaboration between lawyers and psychiatrists. In the meantime, the process and standards of mental examination at each stage of the criminal procedure must be definitive and clear. First of all, during the investigation stage, examination prior to prosecution should be more actively encouraged, considering that judging sanity of the perpetrator at the time of committing a criminal act is important. During the trial stage, the mandatory examination must be conducted depending on the sensitivity and gravity of the case. Next, medical examination to determine criminal responsibility and the one to order treatment and custody must be separately conducted in order to properly execute medical treatment and custody. Obligatory mental examination could be considered both during the stage of request for and execution of the treatment and custody. Lastly, the procedure of examination and format of examination documents need to be standardized for better objectivity and reliability.

Monetary Penalty System and Privacy (벌금형 제도의 현대적 가치와 개인정보문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.107-115
    • /
    • 2015
  • A fine is defined to the criminal penalty which is slighter than imprisonment on a system of criminal penalty, but put practically a seat to imprisonment and similar strong discipline contrivance to commission agent in capitalism societies be doing. Also, did heavy commission, but the corporation time, a fine to consider the respect which cannot impose other criminal penalty, and cannot but impose fine penalty only to this corporation carries out art as important criminal penalty than the commission which a person does. But fine drawing of our country cannot carry out art scaring to criminal penalty to rich body as aggregate fine drawing, and a lot of, but do abatement duration of a fine so as same, and be most in spite of adjudication criminal sentence occupying at criminal case adjudication, and difference cannot do to an amount of a fine that is carrying well out the art. Therefore, and have to change to the daily fine systemdm which gained because of total fine system in order to carry out value as modern criminal penalty, and a few fines shall exchange to penalty payment system according to complement department canon of Penal Code, and social accusation protects individual information of low commission agent if so, can normally do art accomplishment of criminal penalty. The system that the maximum can guarantee right of defence of accused has to have to be introduced in procedural a few aspect to pronounce this and a fine. Specially, let explain necessary fact to be related to, and informal procedures understand, and introduction of drawing to be able to get from accord of accused is necessary for accused before charging to informal decree in order cannot be guaranteed right of defence this of accused while consisting in writing of whether accusation and adjudication are procedural at informal procedures, and to supplement respect.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

Analysis and Practical Use of a $LOGFILE in Digital Forensic (디지털 포렌식 관점에서의 $LOGFILE 분석 및 활용방안)

  • Lee Dong-Eun;Byun Geun-Deok;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.412-415
    • /
    • 2006
  • 본 논문에서는 NTFS 파일시스템의 $LOGFILE을 활용하여 범인의 행동 흐름 파악 메커니즘을 제시한다. 기존에 Carrier, Brian에 의해 제시된 NTFS파일 시스템의 분석은 주로 할당되지 않은 $MFT의 분석을 통해서 이루어졌다.$^{[1]}$ 증거물을 포착하기 위해서 사용되었던 $MFT 분석 방식을 벗어나 $LOGFILE을 통해 범죄자의 파일에 대한 조작 행위의 순서를 파악한다.

  • PDF

A Study on the Anti-Drone Market and Related Technology (안티드론 시장과 관련 기술에 대한 고찰)

  • Oh, Se-Jin;Jeong, Jin-Man;Lee, Jae-Min
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.99-100
    • /
    • 2017
  • 최근 이슈화되는 드론을 매개로 한 테러를 포함한 범죄 행위에 대한 예방 및 방어 기술이 발달하며 그에 따른 시장도 확대되고 있다. 본 연구는 지금 국내외 사례를 통해 어떠한 위협이 있고 관련 기술은 어떻게 발전하고 있는지 또한 관련 당국과 산업, 학계는 어떻게 준비하고 있는지 점검하고 차후 과제를 도출하는데 목적이 있다.

  • PDF

A Design of System Black-Box for Computer Forensics (컴퓨터포렌식 지원을 위한 시스템 블랙박스 설계)

  • Jang, Eun-Gyeom;Lee, Joong-In;Ahn, Woo-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.377-378
    • /
    • 2014
  • 컴퓨터 시스템을 기반으로 이루어지는 범죄 행위로부터 법적인 보호를 받기 위해 관련 법안이 개정되고 이를 수용하기 위한 컴퓨터 포렌식 지원 기술이 다각도로 연구되고 있다. 그러나 시스템 침해자의 시스템 공격 후 본인 흔적을 지우고 나가는 경우 침해자 추출이 어렵다. 또한 휘발성 정보의 손실이 발생하며 디스크에 저장된 비휘발성 정보의 경우 파일의 삭제 및 생성에 의해 디스크 저장영역의 중복된 사용으로 완전한 정보를 추출하는데 문제를 가지고 있다. 이러한 문제를 해결하기 위해 본 연구에서는 시스템 침해자의 공격 형태 및 상황, 환경을 유추하기 위해 행위자를 중심으로 휘발성의 정보를 수집하여 공격 당시의 시나리오의 재현이 가능한 컴퓨터시스템 블랙박스를 설계하였다.

  • PDF