• Title/Summary/Keyword: 범죄 특성

Search Result 292, Processing Time 0.025 seconds

A Study on Collaboration between the Public Law Enforcement and Private Security Sector for the Activation of Security (민간경비 활성화와 공경비와의 민간경비 협력증대방안)

  • Lim, Myeong-Soon
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.273-292
    • /
    • 2005
  • The purpose of this study was to delve into all sorts of literature concerned in a bid to suggest how the Public Law Enforcement and private Security sector could join forces in preventing crimes and guaranteeing the safety of people. Quite naturally, crime has increased greatly to become one of the major social problems. Crime has been conventionally recognized as 'something' to be prevented and controlled by public law enforcement. However, the rate of crime increase has been so rapid that public law enforcement alone could not effectively control the everincreasing and diversified crimes in our society. To serve as a qualified partner for the police, private security industry should strive to secure excellent manpower and provide education for workers to improve their qualifications. Specifically, they should put sustained efforts into diversifying the types of security business and creating a new market to extend their scope of business and become more competitive. Intensified collaboration between the Public Law Enforcement and private Security security sector is expected to create new synergy in addressing people's needs for safety and enhancing their quality of life.

  • PDF

Influence of Police Officer's Networking on Humint Application (경찰관의 인적네트워크수준이 휴민트를 이용한 경찰활동에 미치는 영향)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.606-613
    • /
    • 2018
  • The purpose of this study is to investigate on Humint, one of the intelligence activity conducted by police officer to prevent the possibility of crime in advance and to handle crime in short time. Also, this study aims to identify how interpersonal relationship of police influences Humint acquisition in order to find out the influence of Humint on actual policy activity. For completion, this study conducted survey on current police officer and developed the study based on these data. Humint refers to information acquired by contact between people and to information acquired by intangible contact. Humint, the intangible information, is delivered fast and identifies the other's hidden intention. Humint also approaches inaccessible information and has strength of acquiring information based on five senses instead of using machine. Humint plays vital role in human relations. The investigation on the influence of level, trust, and range of human relations on Humint application demonstrated that people with wide human relations applied Humint effectively on identifying trend. Also, people with wide range of human relations used Humint effectively when utilizing information to handle the crime.

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Modeling of Forensics for Mobile IP Spoofing Prevention (모바일 IP 스푸핑 방지를 위한 포렌식 설계)

  • Park, Sun-Hee;Yang, Dong-Il;Jin, Kwang-Youn;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.307-317
    • /
    • 2012
  • Rapid development of the IT technology and mobile communications has increasingly improved many kinds of digital devices arise, as well as the mobile technology. However, the attacks (virus, hacking and Ip spoofing etc) have also increasingly grown dogged on any region including the society security. As the visual data is prone to copy, delete and move etc, it is necessary that attesting to the integrity of forensics evidence is crucial, as well as data transmission security. This paper presents a framework model using digital forensics method and the results of its performance evaluation for mobile security. The results show that the integrity of the visual data can be obtain with high security and make a proposal refer to prevention of Mobile IP Spoofing attack using our hashing data.

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Video Camera Model Identification System Using Deep Learning (딥 러닝을 이용한 비디오 카메라 모델 판별 시스템)

  • Kim, Dong-Hyun;Lee, Soo-Hyeon;Lee, Hae-Yeoun
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.8
    • /
    • pp.1-9
    • /
    • 2019
  • With the development of imaging information communication technology in modern society, imaging acquisition and mass production technology have developed rapidly. However, crime rates using these technology are increased and forensic studies are conducted to prevent it. Identification techniques for image acquisition devices are studied a lot, but the field is limited to images. In this paper, camera model identification technique for video, not image is proposed. We analyzed video frames using the trained model with images. Through training and analysis by considering the frame characteristics of video, we showed the superiority of the model using the P frame. Then, we presented a video camera model identification system by applying a majority-based decision algorithm. In the experiment using 5 video camera models, we obtained maximum 96.18% accuracy for each frame identification and the proposed video camera model identification system achieved 100% identification rate for each camera model.

Characteristics of Impulsive and Premeditated Aggression Subtypes in Patients with Schizophrenia in South Korea Who Committed a Crime (범죄로 수감중인 국내 조현병 환자의 충동적 공격성과 계획적 공격성의 특성 비교)

  • Kim, Minah;Jo, Yongwoo;Lee, Tae Young;Lim, Kyung-Ok;Kwon, Jun Soo
    • Korean Journal of Schizophrenia Research
    • /
    • v.24 no.1
    • /
    • pp.8-16
    • /
    • 2021
  • Objectives: Although the characteristics of different aggression subtypes provide important information in establishing treatment and prevention strategies in schizophrenia patients, limited information is available about the characteristics of the aggressive subtype in schizophrenia patients in South Korea. The present study was designed to compare the demographic and psychological characteristics across the impulsive and premeditated aggression subtypes in schizophrenia patients in South Korea who had committed a crime. Methods: We enrolled 116 schizophrenia spectrum disorder patients who were admitted to the National Forensic Psychiatric Hospital. Using the criminal and interview records, the study subjects were divided into 83 impulsive and 33 premeditated aggression groups. The subjects' demographic and psychological characteristics were summarized and compared across aggression subtypes. Results: Compared to the premeditated aggression group, the impulsive aggression group had a higher intelligent quotient and a lower rate of physical and sexual abuse experience. Conclusion: To our knowledge, this is the first study to describe the characteristics of aggression subtypes in schizophrenia patients in South Korea who had committed a crime. Our results suggest that different treatment and prevention strategies should be considered for each aggression subtype.

Proposal on the Improvement of Psychological Support System for Cyber Sexual Crime Investigators Based on Their Mental Health Survey (사이버성폭력수사관 정신건강 실태조사에 근거한 심리지원제도 개선 방향에 관한 연구)

  • Bora Kim;Sujin Lim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.43-67
    • /
    • 2022
  • One of the dark sides of the development of information and communication technology is the significant increase in cybercrime. In particular, investigators in charge of cyber sexual crime are repeatedly exposed to video data of illegal sexual violence; hence, they are at high risk of post-traumatic stress disorder (PTSD) and experiencing vicarious trauma. Notwithstanding, few studies have focused on these investigators' PTSD, and, to the best of our knowledge, no study has been conducted on the vicarious trauma of cyber sexual crime investigators. Therefore, this study identifies investigators' mental health status (trauma-related, especially) and examines their perception of the currently operating psychological support programs. Further, by reviewing the psychological support system of overseas institutions, we would suggest psychological support and policies necessary for domestic cyber sexual crime units to manage investigators' work stress and prevent mental illness under domestic circumstances.

Ethereum Phishing Scam Detection based on Graph Embedding and Semi-Supervised Learning (그래프 임베딩 및 준지도 기반의 이더리움 피싱 스캠 탐지)

  • Yoo-Young Cheong;Gyoung-Tae Kim;Dong-Hyuk Im
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.165-170
    • /
    • 2023
  • With the recent rise of blockchain technology, cryptocurrency platforms using it are increasing, and currency transactions are being actively conducted. However, crimes that abuse the characteristics of cryptocurrency are also increasing, which is a problem. In particular, phishing scams account for more than a majority of Ethereum cybercrime and are considered a major security threat. Therefore, effective phishing scams detection methods are urgently needed. However, it is difficult to provide sufficient data for supervised learning due to the problem of data imbalance caused by the lack of phishing addresses labeled in the Ethereum participating account address. To address this, this paper proposes a phishing scams detection method that uses both Trans2vec, an effective graph embedding techique considering Ethereum transaction networks, and semi-supervised learning model Tri-training to make the most of not only labeled data but also unlabeled data.