• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.021 seconds

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Camera Model Identification Based on Deep Learning (딥러닝 기반 카메라 모델 판별)

  • Lee, Soo Hyeon;Kim, Dong Hyun;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.10
    • /
    • pp.411-420
    • /
    • 2019
  • Camera model identification has been a subject of steady study in the field of digital forensics. Among the increasingly sophisticated crimes, crimes such as illegal filming are taking up a high number of crimes because they are hard to detect as cameras become smaller. Therefore, technology that can specify which camera a particular image was taken on could be used as evidence to prove a criminal's suspicion when a criminal denies his or her criminal behavior. This paper proposes a deep learning model to identify the camera model used to acquire the image. The proposed model consists of four convolution layers and two fully connection layers, and a high pass filter is used as a filter for data pre-processing. To verify the performance of the proposed model, Dresden Image Database was used and the dataset was generated by applying the sequential partition method. To show the performance of the proposed model, it is compared with existing studies using 3 layers model or model with GLCM. The proposed model achieves 98% accuracy which is similar to that of the latest technology.

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

Behavioral Theory-Based Risk Node Judgment Algorithm for Evaluating the Crime Risk Level in Restrooms (화장실의 범죄위험도 평가를 위한 행동이론 기반 리스크 노드 판정 알고리즘)

  • Shin-Sook Yoon;Jeong-Hwa Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1197-1206
    • /
    • 2023
  • To assess the risk level of a public restroom implemented in virtual reality, we sought to evaluate the spatial elements present in the restroom. To provide the theoretical foundation for the evaluation subjects and criteria, we introduced prior research that proposed a checklist to entance the safety of public restroom. To set up evaluation criteria, we analyzed and established based on the theories of Paul J. Brantingham and Patricia L. Brantingham, focusing on the interaction between space and criminals. Ronald V. Clarke's "Routine Activity Theory" was also introduced and incorporated into the evaluation approach. We analyzed based on the correlation between the criminal, user, and spatial elements of the public restroom in terms of the criminal's actions, the spatial relevance to crime, and user exposure during use. Using these criteria, we developed an algorithm to evaluate th spatial elements of public restroom. Based on this, we created an application, demonstrating the feasibility of developing on evaluation tool.

Research on Effectiveness of Policy to Ban Violent Animation (폭력성 애니메이션 금지 정책의 효과에 관한 연구)

  • Choi, Seong-Rak;Park, Kyoung-Lae;No, Woo-Young
    • Cartoon and Animation Studies
    • /
    • s.13
    • /
    • pp.181-197
    • /
    • 2008
  • Government set violence as one of the important criteria when it rates movies or TV programs for juveniles. The purpose of selling this criteria is to prohibit the violence in TV programs or movies from affecting the actual behavior of juveniles. However, it is still under discussion how much the violence in broadcasting media actually affects juvenile violence. Korea once carried out a social experiment on juvenile violence media. Back in 1970, violent animation was popular in Korea and Korean government completely banned televising violent animations from September 1980 in an effort to prevent juvenile violence. Investigating the effect of this policy on juvenile violence would draw some implications. The result shows that the policy to ban violent animation in September 1980 didn't have meaningful effect on the trend of juvenile violence. The implication from this paper is that there is no certain cause-and-effect relationship between violent animation and juvenile violence. Another implication is that In-depth discussion is needed if this governmen4 policy is violating the juvenile's right to choose public media.

  • PDF

Analyzing Past User History through Recovering Deleted $UsnJrnl file (삭제된 $UsnJrnl 파일 복구를 통한 과거 사용자 행위 확인)

  • Kim, Dong-Geon;Park, Seok-Hyeon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • These days, digital forensic technologies are being used frequently at crime scenes. There are various electronic devices at the scene of the crime, and digital forensic results of these devices are used as important evidence. In particular, the user's action and the time when the action took place are critical. But there are many limitations for use in real forensics analyses because of the short cycle in which user actions are recorded. This paper proposed an efficient method for recovering deleted user behavior records and applying them to forensics investigations, then the proposed method is compared with previous methods. Although there are difference in recovery result depending on the storage, the results have been identified that the amount of user history data is increased from a minimum of 6% to a maximum of 539% when recovered user behavior was utilized to forensics investigation.

A Study on the Judgment Criteria for the Trademark Dilution of Famous Marks

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.225-232
    • /
    • 2019
  • The trademark dilution of famous marks as a kind of unfair competition practice is defined and regulated in Article 2 (1) (c) of the Unfair Competition Prevention and Trade Secret Protection Act (hereinafter referred to as the Unfair Competition Prevention Act), which was newly established according to the amendment of the Act on February 3, 2001. Famous trademarks are universally protected in all around the world, which are likewise protected in the Republic of Korea by the Unfair Competition Prevention Actin line with such international trends. In order to establish the trademark dilution of famous marks, it is necessary to have the following characteristics: (1) high reputation of the original mark, (2) use of identical or similar markscompared to the original mark, (3) occurrence of blurring of discrimination or tarnishment of reputation; in particular, with respect to the degree of proof of 'blurring of discrimination or tarnishment of reputation', which is a constituent requirement of the trademark dilution of famous marks, it is reasonable to interpret the trademark dilution as concrete endangerment offense, neither harm-based offense nor abstract endangerment offense, and thus it should be considered that the crime is established if a specific realistic risk of blurring of discrimination or tarnishment of reputation occurs. Furthermore, in relation to the specific criteria of 'blurring of discrimination or tarnishment of reputation', it is necessary to comprehensively judge the degree of individual behavior in specific matters as a normative factor as well as the psychosocial viewpoint of the general public.

Mediated Effect of Mobile Financial Crime Fear on the Relationship between Mobile Financial Crime Vulnerability Perception and Mobile Financial Using (모바일금융범죄 취약성인식과 모바일금융 사용 간의 관계에서 모바일금융 범죄두려움의 매개효과)

  • Kwon, Joon-Sung;Gong, Jung-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.305-314
    • /
    • 2020
  • Mobile environment is relatively free from time and space constraints, and has unique characteristics such as not applying physical and social vulnerability because of it's non-face-to-face channel. Since such spatial and temporal speciality is likely to appear in a different form from psychological action and action in a general face-to-face environment, it is necessary to conduct an empirical study based on the results of the existing research that has been studied as major psychological variables of action in mobile environment. However, advance research have not been conducted in earnest on the vulnerability and anxiety of the consumers in a new environment called mobile finance. so this study intends to establish the basis through empirical research. As a result, women among traditional vulnerable groups perceived themselves to be vulnerable in mobile financial environments than men and felt fear of crime strongly. In addition, the vulnerability of mobile financial crime did not have a significant direct effect on mobile financial use, but it was confirmed that mobile crime fear was mediated completely and had an indirect effect on mobile financial use.

Study on Safety Measures for Foreign Tourists Visiting Korea (외국인 관광객 대상 위법행위 실태와 관광경찰제도에 관한 연구)

  • Lee, Chang-Moo;Lee, Do-Sun
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.197-220
    • /
    • 2013
  • To develop the tourism industry, which is a 'no smoking environment-friendly green industry' and can contribute to creating jobs, it is the goal of top priority to resolve foreign tourists' discomfort and fear by allowing them to look around the country satisfactorily without fear and return to their home and inducing them to naturally promote tourism in South Korea to people around them. No matter how great tourist attractions a country has, there is not many foreign tourists who will go on a tour trembling with fear of crimes such as thefts, frauds, threats and blackmail. Therefore, it is necessary to prepare the conditions of tourism free from various illegal acts and inconveniences for domestic and foreign tourists, and for this, it is urgently necessary to make efforts to improve laws and institutions. Domestic tourists can report their complaints themselves through the Tourist Complaint Center of Korea Tourist Service, Inc. or Korea Consumer Agency, or to the police through the 112 Crime Report. In contrast, there are a lot of cases in which foreign tourists cannot receive compensation as it is not easy for them to report due to the differences in language, culture and the criminal justice system though they have suffered illegal acts or inconveniences. This, consequently, has an adverse effect that would disturb the tourism in South Korea as the tourists may spread its bad images to people around them after they return to their home countries with discomfort, so it is urgently necessary to establish a foreign tourist-centered tourist police system.

  • PDF

Reinterpretation on Propertiness of Online Game Item (온라인게임 아이템의 재물성에 대한 재검토)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.153-160
    • /
    • 2013
  • Online game provides a kind of cyber money aden and game instruments, items in order to attract game users. Game users want stronger, better and higher-leveled items with competition. Demands and supplies on items are formed and the transactions are made. The problem is there happen frequently illegal behaviors in the process of transactions. Among these illegal behaviors, for using other's id and password without authorization and stealing items, rejecting to return assigned items, providing stolen item to other who knows the fact or destroying others' items, it is difficult to apply provisions on properties in the criminal code on them. Because the criminal code has a duty to prevent separation between substantial criminal behavior and regulations, it should reflect substantial cultures and values of the times. Therefore, property like items in cyber space can be considered as new property to need to be protect under the criminal code and it may be not an interpretation of expansion. The reason is it is practical and reasonable to judge whether propertiness can be established considering cyber space's unique characteristics. It is time to review propertiness of Article No. 346 according to the request of times of the digital age.