• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.03 seconds

Study about the role of the Prevention of School Safety Keeper System (학교안전지킴이의 학교폭력예방에 대한 제도적 고찰 - 전문성과 제약성을 중심으로 -)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.3-13
    • /
    • 2013
  • School violence that have occurred recently, showing a tendency to collectivization and diverse types of violence, as well as the quality and increase the damage levels. School violence in the home, school, and social factors, but is caused by the lack of awareness about the violence and the reporting of consciousness due to poor acts of violence indirectly assisted. The only place violence has caused the school to establish the legal and institutional arrangements in order to minimize school violence have no choice but to limit its effectiveness is negligible. The problem of school violence in connection with the problem of juvenile crime prevention and control, and punishment should be made of the complex and layered. Operation and School police system, School safety keeper system, school sheriff system since 2005, each municipality in order to minimize school violence, but have no practical help to limit the visible and symbolic effects. Nonexistent professional staff of the institution or school safety monitors emphasis on monitoring the physical state of the system in the form of 'guards' departure inherently have limitations. Also, to prevent criminal acts or violence in the state is not given special privileges and the appropriate role for the school keeper is a problem with the system. Report no other role can not be expected. Should therefore be preceded by a systematic improvement and training of experts in order to prevent school violence, and home and school, in terms of social support and measures.

Implementation of Video-Forensic System for Extraction of Violent Scene in Elevator (엘리베이터 내의 폭행 추출을 위한 영상포렌식 시스템 구현)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2427-2432
    • /
    • 2014
  • Color-$X^2$ is used as a method for scene change detection. It extracts a violent scene in an elevator and then could be used for real-time surveillance of criminal acts. The scene could be also used to secure after-discovered evidences and to prove analysis processes. Video Forensic is defined as a research on various methods to efficiently analyze evidences upon crime-related visual images in the field of digital forensic. The method to use differences of color-histogram detects the difference values of histogram for RGB color from two frames respectively. Our paper uses Color-$X^2$ histogram that is composed of merits of color histogram and ones of $X^2$ histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing Color-$X^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet (브라우저 익스텐션 기반 암호화폐 지갑의 디지털 포렌식 아티팩트 수집 및 분석 연구)

  • Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.471-485
    • /
    • 2023
  • Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires artifacts from the data and memory area of a local PC based on user behavior from four browser extension wallets (Metamask, Binance, Phantom, and Kaikas) to track and retrieve cryptocurrencies used in crime, and analyzes how to use them from a digital forensics perspective. As a result of the analysis, the type of wallet and cryptocurrency used by the suspect was confirmed through the API name obtained from the browser's cache data, and the URL and wallet address used for the remittance transaction were obtained. We also identified Client IDs that could identify devices used in cookie data, and confirmed that mnemonic code could be obtained from memory. Additionally, we propose an algorithm to measure the persistence of obtainable mnemonic code and automate acquisition.

Detecting lies through suspect's nonverbal behaviors in the investigation scene (군 수사현장에서 용의자의 비언어적 행동을 이용한 거짓말 탐지)

  • Si Up Kim;Woo Byoung Jhon;Chung Hyun Jeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2006
  • This study was examined the effective nonverbal behavior cues of detecting suspects' lies in the investigation scene. In order to search the suspects who drank the alcohol liquor without a permission, 18 soldiers were interviewed. 8 solders had drunken alcohol and had lied when was asked(lie group). The other 10 soldiers hadn't drunken alcohol and had told the truth(truth group). The mean frequencies of nonverbal behaviors were compared lie group with truth group. The following behaviors were measured by frequency: vocal characteristics (high pitch of voice, speech hesitations, speech error, frequency of pauses, period of pauses, latency period), facial characteristics (gaze, smile, touching face, blinking, facial micro-expression), body movement (illustrators, hand and finger movement, leg and foot movement, head movement, trunk movement, shifting position). As results, this study found that deception cues were periods and frequencies of pause, micro-expression, head movements. The lie group had less periods and frequencies of pause, and more micro-expression, head movements than truth group. But, this study didn't found Othello's error cues.

Andro-profiler: Anti-malware system based on behavior profiling of mobile malware (행위기반의 프로파일링 기법을 활용한 모바일 악성코드 분류 기법)

  • Yun, Jae-Sung;Jang, Jae-Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.145-154
    • /
    • 2014
  • In this paper, we propose a novel anti-malware system based on behavior profiling, called Andro-profiler. Andro-profiler consists of mobile devices and a remote server, and is implemented in Droidbox. Our aim is to detect and classify malware using an automatic classifier based on behavior profiling. First, we propose the representative behavior profiling for each malware family represented by system calls coupled with Droidbox system logs. This is done by executing the malicious application on an emulator and extracting integrated system logs. By comparing the behavior profiling of malicious applications with representative behavior profiling for each malware family, we can detect and classify them into malware families. Andro-profiler shows over 99% of classification accuracy in classifying malware families.

A Implement of Integrated Management Systems for User Fraud Protection and Malware Infection Prevention (악성코드 감염방지 및 사용자 부정행위 방지를 위한 통합 관리 시스템 구현)

  • Min, So-Yeon;Cho, Eun-Sook;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8908-8914
    • /
    • 2015
  • The Internet continues to grow and develop, but there are going to generate a variety of Internet attacks that exploit it. In the initial Internet environment, the attackers maliciously exploited Internet environments for ostentations and hobbies. but these days many malicious attempts purpose the financial gain so systematic and sophisticated attacks that are associated with various crimes are occurred. The structures, such as viruses and worms were present in the form of one source multi-target before. but recently, APT(Advanced Persistent Threat, intelligent continuous attacks) in the form of multi-source single target is dealing massive damage. The performance evaluation analyzed whether to generate audit data and detect integrity infringement, and false positives for normal traffic, process detecting and blocking functions, and Agent policy capabilities with respect to the application availability.

A Study on the Habitual or Repeated Sexual Offenses in School (학교에서 발생한 상습·반복적 성범죄에 관한 연구)

  • Park, Mi-Rang;Park, Ji-Sun;Sohn, Hyun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.692-700
    • /
    • 2017
  • Based on the sexual offenses committed in school, the present study investigated differences between habitual/repeated sexual offenses and one-off sexual offenses in terms of offender characteristics, victim characteristics, and offense characteristics. We examined a total of 218 sexual offense cases committed in school. As a result, we found significant differences in the age, job, and residential area between habitual/repeated and one-off sexual offenders in school. In addition, notable differences were found between habitual/repeated and one-off sexual offense cases in the age and alcohol use of the victim. Moreover, habitual/repeated and one-off sexual offenses in school differed significantly by offense planning, method of approaching the victim, type of sexual behavior, and victim resistance. Furthermore, we conducted regression analyses and identified multiple factors that contributed to lasting of the sexual offense in school. Finally, we discussed limitations of the present study and made suggestions for future research.

A Study on Influence of Terror Information on Fear of Terror (테러에 대한 정보가 두려움에 미치는 영향)

  • Kim, Sang-Woon;Cho, Seung-A
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.530-538
    • /
    • 2019
  • The purpose of this study is to examine the influence of terror information on fear of terror. This study examined how indirect delivery of terror information influence on the public's fear toward terror to identify the reason for fear toward terror and to analyze the varying influence based on the information type. Terror is an unjust way where individual or group with certain purpose use various types of violence such as murder, abduction, kidnapping, sniping, and plunder to raise social fear status and accomplish their own will. When terror occurs, many people show fear toward terror and they withdraw from all life activities due to fear. Thus, terror goes beyond creation of fear by using the violence. Instead, terror has a negative influence on people's lives in all social, economic, and cultural fields. This study examined how terror information influencing on indirect terror experience influences on the fear of terror. The result showed that both confirmed information and unconfirmed information influencing on indirect experience had significant influence on the fear of terror. Also, the result showed the unconfirmed terror information had higher influence on the fear compared to the confirmed information.

Common People's Emotional Response and Attitude toward Law in Korean Society (한국인의 법의식: 법리(法理)와 정리(情理)의 갈등)

  • Si-Up Kim;Ji-Young Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.9 no.1
    • /
    • pp.67-79
    • /
    • 2003
  • Why, in general, don't Korean people follow the law? Possible one of the answers to this question is based on lay people's emotional evaluation to the law in which common people's evaluation to the guilty according to their private logics comparing to public logics of facts and sentence of illegal behavior. Futhermore, in psychological field, there have been some researches concerning on differences in morality such as moral judgement and evaluation including moral inference among cultures. Therefore, the reason why Korean people tend to be not law observance and law break is that Korean people are not immoral such as telling a lie and not keeping promises, but rather they have a tendency of appling their private and personal logics based on Cheong(interpersonal affection) relationships and logics to public and legal affairs.

  • PDF