• Title/Summary/Keyword: 범죄행위

Search Result 251, Processing Time 0.023 seconds

Crime prevention role and limitations of private security organizations (민간방범기구의 범죄예방 역할과 한계)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.33-41
    • /
    • 2012
  • Important crime prevention is emphasized. Depending on the type of criminal act itself, but with many material and human damage because it is a threat to the safety of civil life. The traditional police power of the police in patrolling the derailment by the diversification of the crime, globalization, organizing, specialization, and ferocious anger by far exceeds the capabilities of the police crime prevention are occurring. Civilian police crime prevention organizations in the area of the region as a base for complementary activities, and even if the purpose of commercial availability, but many organizations is the autonomous and spontaneous personality voluntary work civic life is to serve as the safety fence. But that suits the role of these organizations and social support and lack of institutional support and practical and effective crime prevention activities has not been effective. Law reform and the role of the Organization for the maintenance of redundancy, or a series of systematic effort to equip networks and take advantage of the functional and has been factory.

A Study on the Development of a Platform for the Prevention of Digital Sexual Crimes in the Virtual-Reality Metaverse (가상현실 메타버스 디지털 성범죄 예방을 위한 플랫폼 구축 제안 연구)

  • Jae-Won, Hwang;Jung-Heum, Park;Sang-Jin, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1157-1166
    • /
    • 2022
  • With the advent of the non-face-to-face era, a new type of digital sexual crime with avatars is emerging on the Metaverse virtual reality platform. Due to the lack of clearly established in legal and regulatory systems, it is challenging to punish offenders and acquire digital proof for sexual crimes using these avatars. This research aims to suggest a service and technological solution is development platform that may assist crime prevention and the collection of digital evidence, with a particular emphasis on digital sex crimes that occur in the metaverse, a virtual reality realm. This study explores the reasons behind the difficulty of legal application in the metaverse and then determines the types of digital sex crimes that may occur in the metaverse. In addition, it is suggested what service components the metaverse should contain from the stage of construction and design, can be utilized what element of metaverse in order to prevent illegal activity of avatars.

A Critical Review and Legislative Direction for Criminal Constitution of Piracy (해적행위의 범죄구성요건에 대한 비판적 고찰과 입법 방향)

  • Baeg, Sang-Jin
    • Journal of Legislation Research
    • /
    • no.55
    • /
    • pp.167-191
    • /
    • 2018
  • Despite international cooperation, piracy has not yet been eradicated in major waters around the world. From the perspective of South Korea, which is absolutely dependent on exporting and importing, it's a lifeline for us to secure safe maritime traffic so it is a situation we have to be vigilant about maritime safety and security. However, criminal law on punishment of piracy is still insufficient and legislative consideration is needed. Since pirates are regarded as enemies of humankind, all nations can punish pirates regardless of their damage. The international community has done its best in cooperation from hundreds of years ago to secure maritime trade through this universal jurisdiction and marine transportation in international waters which is an essential space for military activities, particularly in the Gulf of Aden, the advanced nations have dispatched fleets to combat maritime security threats through joint operations to crack down on Somali pirates. Even if universal jurisdiction is allowed for piracy in accordance with the International Convention on Human Rights and the United Nations Convention on the Law of the Sea, it is difficult to effectively deal with piracy if it not fully complied with a domestic legal system for this purpose or is stipulated as different from international regulations. In other words, universal jurisdiction corresponding to international norms and constitution of piracy should be defined in criminal law in accordance with criminal statutory law. If the punishment of pirates by unreasonably applying our criminal law without prejudice to such work can lead to diplomatic disputes in violation of the Universal Declaration of Human Rights or other international norms. In South Korea, there is no provision to explicitly prescribe piracy as a crime, but punish similar acts like piracy in criminal law and maritime safety law. However, there is a limit to effective piracy punishment because we are not fully involved in internationally accepted piracy. In this study, we critically examine the proposals of the constitutional elements of piracy, propose the legislative direction, and insist on the introduction of globalism to pirate sins.

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

Classification of Tor network traffic using CNN (CNN을 활용한 Tor 네트워크 트래픽 분류)

  • Lim, Hyeong Seok;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prevent the crime attempts in advance and secure the organization's information system. This paper proposes a novel classification model that can detect Tor traffic and classify the traffic types based on CNN(Convolutional Neural Network). We use UNB Tor 2016 Dataset to evaluate the performance of our model. The experimental results show that the accuracy is 99.98% and 97.27% in binary classification and multiclass classification respectively.

청소년의 초기부적응심리도식이 외현화 문제행동에 미치는 영향: 인지적 정서조절에 매개효과

  • Choe, Pil-Yeol;Byeon, Sang-Hae
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2022.11a
    • /
    • pp.67-70
    • /
    • 2022
  • 최근 코로나19가 발생한 2020년부터 청소년의 문제행동은 지능화, 다양화되고 범죄와 폭력의 비중은 높아지고 있다. 청소년의 절도, 사기, 장물, 횡령 등과 같은 초범의 재산 범죄가 44.8%(2015)에서 45.1%(검찰청, 2020), 언어 및 신체의 학교폭력 피해자가 45.2%(2015)에서 54.1%(교육부, 2021)로 나타나 청소년 문제행동에 대한 심각한 실정을 알 수 있다. 청소년기의 범죄와 폭력은 욕망을 충족하기 위한 수행과 목표 달성의 도구적 행위이며 고위험군의 외현화 문제행동이다(Cornish & Clarke, 2002). 외현화 본 연구의 목적은 청소년의 초기부적응심리도식이 외현화 문제행동에 미치는 영향과 인지적 정서조절 매개효과를 실증적으로 검증하고자 한다. 연구를 위해 경기도 소재 중·고등학교 학생 953명을 대상으로 설문조사를 실시하고, SPSS ver. 25.0과 Hayes(2013)가 개발한 Process Macro를 사용하여 자료를 분석하였다. 분석결과는 다음과 같다, 첫째, 초기부적응심리도식이 높을수록 외현화 문제행동이 높은 것으로 나타났다(F=41.871, p<.001). 둘째, 초기부적응심리도식과 외현화 문제행동의 관계에서 인지적 정서조절의 매개효과가 나타났다(F=111.594, p<.001). 따라서 본 연구는 청소년의 외현화 문제행동을 예방 및 감소, 초기 부적응심리도식의 완화를 위해 인지적 정서조절의 효과를 높일 수 있는 상담 및 교육프로그램에 필요한 기초자료를 제공하는데 의의가 있다.

  • PDF

A Legal Trend and Preventive Measure on the High-Technology Industry Drain (첨단산업기술유출의 방지대책현황과 법적 동향)

  • Kim, dong-bok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.305-309
    • /
    • 2007
  • We live in high level of knowledge and information society spread of computer and rapid expansion of internet. Computer crime is various, complicated and inscrutable. we call it cybercrime. Therefore we should draw up a preventive device of the high-technology industry drain. This study is focused on the legal trend of preventive measure on the high-technology industry drain.

  • PDF

Corresponds problems to Business scam and measures in the trade industry (무역 산업에서의 비즈니스 스캠(Business Scam) 대응 문제점과 대책 방안)

  • Lee, Eun-Kyoung;Jo, Young-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.307-310
    • /
    • 2016
  • 우리나라의 무역 교역량이 '11년부터 3년 연속 1조 달러를 돌파하면서 인터넷 무역도 활성화 되고 있으나 인터넷 무역의 특징인 비대면 거래과정을 악용한 사기 행위가 급증하여 기업의 피해가 증가하고 있는 실정이다. 이메일을 해킹하여 거래처로 위장해 무역 거래대금을 가로채는 사이버범죄 수법인 비즈니즈 스캠(Business Scam)은 건전한 무역 활동에 위협적인 요소로 작용하고 있다. 이와 같이 무역 산업의 위협이 증가하고 있는 현재 상황에서 본 연구는 정보보호 관점에서 기술, 정책, 제도, 법률, 관련 사례를 조사 분석하여 비즈니스 스캠의 효율적인 피해방지 방안을 제시하고자 한다.

  • PDF

A Study on Arson & Murder of Whole Family in Munhwadong Deageon (대전 중구 문화동 가옥 방화 사건에 대한 고찰)

  • Kim, Jin-Pyo
    • Journal of Korean Institute of Fire Investigation
    • /
    • v.9 no.1
    • /
    • pp.61-64
    • /
    • 2006
  • 지난 2005년 8월 18일 대전광역시 중구 문화동 가옥에서 발생한 화재를 사례로 하여 현재 발생되고 있는 보험범죄의 잔인하고 반인륜적인 모델을 제시하였다. 동 사례는 일가족 4명이 화재로 인하여 사망하였으며, 초기에는 전기누전에 의한 단순한 화재로 오인되었으나, 현장의 정밀감정, 소사체의 정밀 부검 및 면밀한 수사를 통하여 보험금을 노린 살인 방화사건으로 밝혀진 사례이다. 본 고찰에서는 화재현장의 상황, 가옥 내부의 연소형태, 전기적인 특이점, 연소매개체, 피의자의 행위, 연소지연시간의 발생 및 수사 자료를 근거로 제시하고, 종합적으로 고찰하여 일가족 4명을 살해한 후, 시너를 연소매개체로 사용한 방화에 의해 화재가 발생한 것으로 판단한 사례이다.

  • PDF

A Study on Anomaly Detection based on User's Command Analysis (사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구)

  • 윤정혁;오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.59-71
    • /
    • 2000
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.