• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.023 seconds

Relationship between a Role Ambiguity·Conflict and Job Satisfaction, Job Performance on Role of Tourism Police Officers (관광경찰 역할에 대한 역할모호성·역할갈등과 업무만족, 업무수행도와의 관계)

  • Kim, Sang-Woon;Cho, Seung-A
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.1
    • /
    • pp.132-139
    • /
    • 2015
  • The tourism police force has been established on 16th October 2013 for foreign tourists' safety and security. The major roles of tourism police officers were provided a crime prevention patrol and maintenance of order in tourist destination, a clampdown on illegal activities for foreign tourists, a controlling for overcharging of restaurants accommodations taxi, an administrative guidance and controls on tourism industry and worker in union relative organ like the Ministry of Culture, Sports and Tourism local government. However, the roles of tourism police officers overlap the work of general police officers and work of tourism police officers need a cooperative business with relative organs. It is caused a role ambiguity conflict between tourism police officers and general police officers. The object of this study is to improve the tourism police system through investigate a perceived gap of role ambiguity conflict between tourism police officers and general police officers and influencing relationship of role ambiguity conflict between job Satisfaction and job Performance.

Improvements of Legal System for Security Enhancement of Korean National Assembly' Attending System (국회 방청제도의 보안강화를 위한 법·제도 개선방안)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2017
  • The purpose of this study is to analyze any hinderance factors for successful attending system of Korean National Assembly and to provide improvement plans of legal systems to ensure security of National Assembly. First, the conceptualization and functions of Korean National Assembly attending system were discussed and related regulations and laws were also examined. Second, hinderance factors, such as sharp increase in 1) illegal behaviors, 2) bring in prohibited items, and 3) possibility of National Assembly terror, for successful attending systems were analysed. Third, improvements of legal system for security enhancement of National Assembly Attending System were discussed: 1) new legislation for providing National Assembly's security officers with special judicial police power is needed to deal with criminal behaviors and to protect human rights, and 2) legal reforms are required to provide right to command to National Assembly's Security Planning Office rather than National Assembly security office under Seoul Metropolitan Police Agency in order to unify commanding system.

Comparative Study on Major Nations's Related Legislation for Counter-terrorism (테러대응 관련 법제의 국가별 비교 연구)

  • Kwon, Jeong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.343-352
    • /
    • 2010
  • As a result of comparing and analyzing the related legislation of each nation, more superior legislative systems should be made to cope with a number of terrors effectively. And also it is required to devise some concrete regulations such as the following in superior legislative systems. First, because it is hard to collect information on terrorism and watch over suspects according to Communication Privacy Protection Law. More in-depth discussion into the issue of surveillance is needed for the protection of lives and property, although public concerns of privacy are a valid point of contention. Second, it is necessary to take complementary measures on immigration as surveillance, since the current Immigration Control Law has restrictions in many ways to hinder efforts to root out terrorists. Third, under the current law on financial activities, it is impossible to block influx of terror financing. Therefore it is necessary to come up with ways of making the punishment procedures. Fourth, considering that convicted terrorists get punished under the standard procedures and precedents, it is required to clearly differentiate between what the terror acts are and what terrorist groups are. Fifth, it is necessary to make use of the private security system to enhance the security system of national facilities.

A Concept Analysis of Prisoner Corrrection (수형자 교정에 대한 개념분석)

  • Jung, Hyun-Ok;Han, Seung-Woo
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.357-366
    • /
    • 2018
  • The purpose of this study is to provide data for the development of a nursing intervention program by analyzing the concept of prisoner correction. From April 1st, 2016, to July 30th, the research literature on all domestic and international prisoner correction from 2011 to 2015 were searched using PubMed and NDSL RISS. 37 documents were analyzed according to conceptual analysis method procedures by Walker and Avant. In order to promote a positive attitude toward life through internal reflection of prisoner correction, individual characteristics for improvements in problem solving abilities, social adaptation abilities, re-socialization and the protection of the people and society to inmates displaying anti-social and moral behaviors that violated the law. The purpose of this study was to establish a desirable direction for prisoner correction, and provide a theoretical basis for the development of a nursing intervention program.

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

A Global Comparative Study on the Game Rating System (게임물 등급분류제도의 국제 비교 연구)

  • Kim, Sung-Won;Lee, Hwan-Soo;Jung, Hae-Sang
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.91-108
    • /
    • 2019
  • Game have become a universal leisure culture for the world. However, not only did the development of the game industry have a positive impact on society, but it also brought about various social problems, such as adversely affecting youth and encouraging criminal acts. In order to minimize these effects, countries around the world operate a game rating system to provide games suitable for age and social values from children and young people to the general public. Since games are new digital content, the limitations of the rating system are still discussed in many studies. Therefore, this study investigates the current status of global game regulation by investigating game rating systems of various countries including Korea. In addition, by comparing and analyzing the game rating system in Korea and the system of other countries, this study suggests a direction to improve our system more appropriately. The results of this study will contribute to securing the effectiveness and standardization of domestic game classification system.

Extraction of Sexual Assault to Women in Elevator Using Average Intensity Measure (평균 명암 측정을 이용한 승강기 내에서 여성의 성 추행 추출)

  • Shin, Seong-Yoon;Lee, Hyun-Chang;Rhee, Yang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.55-61
    • /
    • 2013
  • TSexual violence is physical and mental violence that violates the sexual self-determination contrary to the intention of the other party such as rape, forced molestation, sexual harassment, caught hidden camera. It is one of the many criminal acts that male is perpetrators and female is victims. Sexual harassment, one of the sexual violence is forced sexual harassment. It is considered a color frame where each pixel has 3 color components such that RGB. The averaging the absolute difference between the current frame and te next frame is divided by the absolute difference between the current frame and the previous frame. If there was a difference between the frame pair before a scene change the discontinuity value indicating a scene change could be relatively small. Therefore, Thus, the use of the redefined equation and redefined algorithm can be seen as it is much more good via experiment.

The Research on Data Concealing and Detection of SQLite Database (SQLite 데이터베이스 파일에 대한 데이터 은닉 및 탐지 기법 연구)

  • Lee, Jae-hyoung;Cho, Jaehyung;Hong, Kiwon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1347-1359
    • /
    • 2017
  • SQLite database is a file-based DBMS(Database Management System) that provides transactions, and it is loaded on smartphone because it is appropriate for lightweight platform. AS the usage of smartphone increased, SQLite-related crimes can occur. In this paper, we proposed a new concealing method for SQLite db file and a detection method against it. As a result of concealing experiments, it is possible to intentionally conceal 70bytes in the DB file header and conceal original data by inserting artificial pages. But it can be detected by parsing 70bytes based on SQLite structure or using the number of record and index. After that, we proposed detection algorithm for concealed data.

Serious Game : A Study on Aware of Protection for Rights of Software and Digital Contents (기능성 게임 : 소프트웨어 및 디지털콘텐츠 저작권 보호 인식에 관한 고찰)

  • Yoon, Sun-Jung;Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1950-1956
    • /
    • 2010
  • There are scattered various kinds of software and digital contents around modern peoples. Most of peoples do not realize the importance of the problem related with rights protections of software and digital contents that most of peoples are acting illegal use or illegal copy of software or digital contents without any sense of guilt. In this paper, we carry out a survey targeting IT department majors and non-IT department majors about their aware of rights of software and digital contents and then we suggest a problem from the results of a survey and study a solution for advancing problem of aware of rights. The most effective solution of aware improvement of rights is continuous and repetitive education concerning rights. Also, Reasonable prices that should makes for paying cost of copyrights by users.

공정한 은닉 KCDSA 서명에 기반한 추적 가능한 전자화폐 시스템

  • 이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.85-97
    • /
    • 1999
  • A blind signature scheme is a protocol allowing verifier to obtain a valid signature for a message m from a signer without him seeing the message. This means that the bank in collaboration with the shop cannot trace the electronic cash to user. However anonymous electronic cash also facilitates fraud and criminal acts such as money laundering anonymous blackmailing and illegal purchaes. Therefore in this paper we propose fair blind signature scheme based on KCDSA which is a domestic digital signature scheme and it apply a electronic cash system. In particularly a proposed electronic cash system have an anonymity control ability which trace a user who make use a electronic cash illegally in association with a trusted center.