• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.03 seconds

An Empirical Test of Social Learning Theory and Complementary Approach in Explanation of University Students' Crimes in Social Network Services (SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증)

  • Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.91-104
    • /
    • 2015
  • This study tests the effects of differential association, definitions, differential reinforcement and imitation from social learning theory in the explanation of university students' crimes in social network services. In addition, this study tests the interaction effects between social learning factors and other factors such as low self-control, subcultural environment, and crime opportunity for the integrated approach. Using data from 486 university students in Seoul, results show that both definition and imitation have significant influences on crimes, even though differential association and differential reinforcement factors have no significant influences on crimes in social network services. Results also reveal that there are significant interaction effects between definition and subcultural environment, which meana that definition has a strong effect on crimes in high subcultural environment. In addition, it is found that reinforcement has also a strong effect on crimes in high crime opportunity and that interaction effect between imitation and low self-control is significant, which means that imitation has a strong effect on crimes in low self-control students.

사이버범죄방지협약의 국내법적 수용문제

  • 박영우
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.70-75
    • /
    • 2003
  • 인터넷 이용의 급증과 더불어 컴퓨터바이러스, 해킹 및 프라이버시 침해 등 각종 사이버범죄도 또한 날이 갈수록 크게 증가하고 있다. 또한 인터넷과 같이 글로벌한 네트워크 환경에서 발생하는 범죄는 많은 경우 필연적으로 '국제적' 성격을 띠며, 따라서 개별국가의 노력만으로는 범죄를 충분히 방지하기 어렵다. 따라서 다수 국가가 사이버범죄에 대한 수사와 처벌을 위한 협력의 틀을 마련하기 위해 만든 사이버범죄방지협약(Convention on Cyber-Crime)은 컴퓨터시스템, 네트워크 또는 데이터를 대상으로 하거나 이를 오용한 다양한 형태의 범죄행위의 방지 및 처벌과 관련하여 실체법적 측면과 절차법적 측면에서 그 중요성이 매우 높다. 이 글에서는 이 사이버범죄방지협약에 대해 그 제정과정 및 주요내용을 살펴보고, 다음으로 우리법과 비교$.$분석하였다.

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

A Review of 'Continuous Harassment' Provisions under Misdemeanor Punishment Act for Stalking Control (스토킹 규제를 위한 <경범죄처벌법>상의 '지속적괴롭힘' 조항에 관한 검토)

  • Kim, CheongHa
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.4
    • /
    • pp.439-448
    • /
    • 2013
  • The Amendment of Misdemeanor Punishment Act which has been enforced since March 22, 2013 contains Section 3. 1. 41 (titled "Continuous Harassment") which provides that stalking is one's act of "attempt to continuously approach other person or persons against the latter's express intent and thereby demand interviews or associations to them, or commit behaviors such as monitoring, following (shadowing) and ambush over and over again." In South Korea, any wrongdoer who does such act of stalking shall be fined 80,000 Korean won under the Enforcement Decree of Misdemeanor Punishment Act. However, in view of the seriousness of ever-diversified and skillful stalking crimes, we have a question of whether the application of current Misdemeanor Punishment Act would be effective in reality.In order to get over current limitations of Misdemeanor Punishment Act as a part of direct regulatory control over stalking crimes and more properly cope with stalking crimes, this study give the following suggestions.

Network Forensic using Fuzzy Decision Tree (퍼지 의사결정 나무를 이용한 네트워크 증거 분석)

  • Lee, Yong-Hyun;Lee, Seong-Yong;Kim, Dong-Kook;Noh, Bong-Nam
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1017-1020
    • /
    • 2007
  • 컴퓨터의 생활 전반에 걸친 영향으로, 컴퓨터는 우리 생활 속에서 빼놓을 수 없는 하나의 정보 매체로 자리 매김 되었다. 하지만 그 이면에는 컴퓨터를 이용한 전산망 침해 행위, 전자기록 위.변조, 각종 음란물 유통, 바이러스 제작 유포 등 많은 위험들이 우리를 위협하고 있다. 그래서 컴퓨터를 사용한 범죄 행위를 탐지하는 방법에 대한 관심이 높아지고 있다. 또한 각종 범죄 행위는 인터넷을 통한 범죄가 늘고 있어, 네트워크 정보를 통한 포렌식에 관한 연구가 활발하다. 하지만, 매일 많은 양의 패킷을 분석하는 것은 많은 전문 인력과 비용이 소요된다. 본 논문에서는 의사결정나무를 이용한 패킷분석을 통하여 네트워크 포렌식의 정보를 추출하는 방법을 제안한다.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

A Study on Schemes to Case Analysis and Cope with Online Game Crimes (온라인 게임범죄의 사례분석과 대응방안)

  • Yoo Yong-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.85-97
    • /
    • 2006
  • Schemes to case analysis and cope with on-line game crimes net supervision system, a real name confirmation process, and a self-examination system to check by themselves if they are addicted to on-line games with a view to prevent the addiction. In addition, this study found that general precuations should comprise measures to change the awareness of the users of the internet and to establish their ethical senses because most on-line garners are not aware that their actions are a crime and believe their crimes are not disclosed to the outsiders.

  • PDF

A Study on the Enhancement of International Regulation on Maritime Crimes at Sea (해상안전범죄에 대한 국제법상 규제강화방안에 관한 연구)

  • Min, Kkot-Byol;Lee, Yong-Hee
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.05a
    • /
    • pp.141-152
    • /
    • 2006
  • Along with unification world market, marine transportation has become important for international community. At the same tome, piracy, armed robbery and maritime terrorism which threaten marine transport have been issued in international society. International organization like a IMO has continued to regulate maritime crimes by international law and regulation. Bearing in mind the in importance of the issue, this article analyze maritime crimes covering piracy, armed robbery and maritime terrorism about definition and legal character and pointed out problems. Finally it suggest methods to enhance international regulation on them.

  • PDF

사이버범죄의 암호화된 증거 수집에 관한 연구

  • 김소정;임종인;오일석
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.113-122
    • /
    • 2003
  • 현대는 인터넷과 컴퓨터 없이는 잠시도 운용될 수 없는 사회이지만 이를 불법적으로 이용한 범죄행위도 점차 증가하고 있다. 이들 컴퓨터 범죄는 익명성에 기반한 대담성을 보이고 있으며, 개인의 사회적 존재로써의 자각에 있어서도 탈개인화됨에 따라 더 많은 우려를 낳고 있다. 이에 따라 일반 컴퓨터 사용자들의 프라이버시 보호를 위한 방법으로 암호화 방법을 점점 더 많이 사용하고 있는데, 이에 비례해 범죄자들의 암호사용도 증가하고 있다. 그렇다면, 범죄자들이 암호를 사용해 자신들의 범죄증거를 숨기고 있는 경우, 이를 수사하기 위해 공권력 및 수사기관은 어떻게 해야 될 것인가\ulcorner 본 논문은 이러한 문제제기를 통해 새로운 환경에 의해 변화된 코드를 활용하는 새로운 법제도를 통한 적극적인 대비방안을 모색해 보고자 한다. KLS와 같은 신기술을 수사기관 및 법집행기관이 신중하게 사용하여 국가의 법 집행력과 프라이버시권이라는 두 가지 근본 가치의 균형을 이룰 수 있는 방안을 고려하여야 할 것이다. PRIVACY와 SECURITY라는 동전의 양면은 현실생활의 법제도를 그대로 옮겨놓는 것만으로는 한계가 있다. 현재 암호와 관련한 보든 논의는 공론화 되지 못하고있다. 좀 더 공개적으로 암호를 사용한 범죄 행위에 대한 현황과 또 이를 대처한 수사기관의 수사 활동에 대해 논의하고, 그 과정에서 어떤 문제점들이 발생되고 있으며, 이들 문제를 해결하기 위해 필요한 조치들이 무엇인지에 대해 논의하고, 해외 각 국은 이 문제를 해결하기 위해 어떠한 노력들을 기울이고 있는지 살펴본후 종합적인 안목으로 시의 적절한 대책을 세우는 시발점이 되었으면 한다.