• Title/Summary/Keyword: 범죄 특성

Search Result 293, Processing Time 0.026 seconds

Analysis of Group Attitudes toward the Development Plan of the Sobaeksan Jarak-gil Ecological Traill (소백산 자락길 생태탐방로 개발계획에 대한 각 집단 태도분석)

  • Park, Kum-Mi;Jung, Tae-Yeol
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.2
    • /
    • pp.41-51
    • /
    • 2014
  • A self-administered questionnaire survey and face-to-face interviews were conducted on 150 local residents belonging to seven villages, 160 visitors and 86 experts in order to analyze the attitudes of groups of local residents, visitors as well as experts toward the development plan of Sobaeksan Jarak-gil. Reliability analysis and one-way ANOVA were performed on the data collected by a questionnaire survey using IBM SPSS Statistics 20.0 after coding. The Duncan Test was conducted as a post-hoc test. Based on the analytical results, in economic terms, the expert group expected an increase in income, improvement in living standards and increase in expenditure for the maintenance of local infrastructure. In environmental terms, the visitor group was highly concerned about the disruption of the local natural environment and ecosystem, destruction of local properties and landscape, increase in water/soil/air pollution and increase in solid waste and noise. In social and cultural terms, the expert group had higher expectation for excavation of traditional cultural properties, instillation of local patriotism and pride, and the visitor group was highly concerned about a rise in crime, destruction of indigenous culture/increase in imitations, and induction of conflicts between residents. It is estimated that these results will be used as basic data for establishing the development plan of the mountainous ecological trail reflecting opinions of various groups.

A Study on the Type of Litigation through Analysis of Landscape Precedent (조경 판례분석을 통한 소송의 유형화 연구)

  • Park, Hyun-Bin;Kim, Dong-Pil;Moon, Ho-Kyung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.48 no.4
    • /
    • pp.8-18
    • /
    • 2020
  • This study selected landscaping-related precedents among Supreme Court decisions to which the Basic Construction Industry Act and Civil Litigation Act were applied, and divided them by year, by sector type, and by litigation type according to the cause of the litigation, and examined time-series trends and the main characteristics of landscaping-related litigation. As a result of the analysis by year, it became apparent that litigation cases began to appear in earnest in 1977, similar to when landscape licenses were first issued. The types according to the cause of the litigation were analyzed by dividing them into 'planning', 'construction', and 'management'. Among them, 'planning' was the most frequently identified (409 cases). Various precedents were searched according to 'construction', and some of them were found to be due to unclear legal standards related to landscaping. In 'management', cases such as safety accidents and crimes were considered. The users, legal definitions, and purposes of the space served as the basis for judgments. As a result of analysis by case type, there were many administrative landscaping-related cases, and the proportion of criminal cases in the management type was the highest. The results of this study looked at precedents across the entire landscape industry, and it was significant that it provides basic data that could be used by the general public as that they were categorized by field. In the future, amendments to the law and various studies should be conducted to reduce and resolve disputes, and it is necessary to expand the publicity of precedents for this purpose.

In about Solution for Improvement in the Private Security Sector research (민간경비 구성요인에 따른 개선방안에 관한 연구)

  • Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.265-282
    • /
    • 2008
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

Counterfeit Money Detection Algorithm using Non-Local Mean Value and Support Vector Machine Classifier (비지역적 특징값과 서포트 벡터 머신 분류기를 이용한 위변조 지폐 판별 알고리즘)

  • Ji, Sang-Keun;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.1
    • /
    • pp.55-64
    • /
    • 2013
  • Due to the popularization of digital high-performance capturing equipments and the emergence of powerful image-editing softwares, it is easy for anyone to make a high-quality counterfeit money. However, the probability of detecting a counterfeit money to the general public is extremely low. In this paper, we propose a counterfeit money detection algorithm using a general purpose scanner. This algorithm determines counterfeit money based on the different features in the printing process. After the non-local mean value is used to analyze the noises from each money, we extract statistical features from these noises by calculating a gray level co-occurrence matrix. Then, these features are applied to train and test the support vector machine classifier for identifying either original or counterfeit money. In the experiment, we use total 324 images of original money and counterfeit money. Also, we compare with noise features from previous researches using wiener filter and discrete wavelet transform. The accuracy of the algorithm for identifying counterfeit money was over 94%. Also, the accuracy for identifying the printing source was over 93%. The presented algorithm performs better than previous researches.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

Study on File Recovery Based on Metadata Accoring to Linux Kernel (리눅스 커널에 따른 메타데이터 기반 파일 복원 연구)

  • Shin, Yeonghun;Jo, Woo-yeon;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.77-91
    • /
    • 2019
  • Recent Linux operating systems having been increasingly used, ranging from automotive consoles, CCTV, IoT devices, and mobile devices to various versions of the kernel. Because these devices can be used as strong evidence in criminal investigations, there is a risk of destroying evidence through file deletion. Ext filesystem forensics has been studied in depth because it can recovery deleted files without depending on the kind of device. However, studies have been carried out without consideration of characteristics of file system which may vary depending on the kernel. This problem can lead to serious situations, such as those that can impair investigative ability and cause doubt of evidence ability, when an actual investigation attempts to analyze a different version of the kernel. Because investigations can be performed on various distribution and kernel versions of Linux file systems at the actual investigation site, analysis of the metadata changes that occur when files are deleted by Linux distribution and kernel versions is required. Therefore, in this paper, we analyze the difference of metadata according to the Linux kernel as a solution to this and recovery deleted file. After that, the investigating agency needs to consider the metadata change caused by the difference of Linux kernel version when performing Ext filesystem forensics.

A Study on the Trends of Korean Juvenile Gambling (청소년 도박의 국내 연구동향 분석)

  • Ko, Do-Hyun;Kim, Sang-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.660-671
    • /
    • 2021
  • This paper analyzed the research trends of juvenile gambling, which is increasing due to recent changes in the internet environment. The number of domestic studies on juvenile gambling has increased, but there are few studies that analyzed both degrees and academic papers in a more comprehensive manner than addiction to the Internet, games, and drugs related to youth. The current state of juvenile gambling can lead to secondary crimes, such as illegal loans and thefts for gambling funds beyond the level of addiction, school violence and money extortion, which have been a major shock to Korean society. Therefore, it is urgent to prepare social measures because the age of adolescents who are exposed to gambling is becoming lower. Accordingly, this study analyzed 52 dissertations, 86 academic papers, and three other research reports published in Korea from 2003 to March 2020. As a result, quantitative research, research subjects, and research topics were concentrated, and there was a limit to generalization. In addition, these results will provide rich information to future studies by confirming the academic characteristics according to the times and interdisciplinary research trends that transcend individual science areas.

Hiker Mobility Model and Mountain Distress Simulator for Location Estimation of Mountain Distress Victim (산악 조난자의 위치추정을 위한 이동성 모델 및 조난 시뮬레이터)

  • Kim, Hansol;Cho, Yongkyu;Jo, Changhyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.55-61
    • /
    • 2022
  • Currently police and fire departments use a Network/Wifi/GPS based emergency location positioning system established by mobile carriers to directly link with the device of the people who request the rescue to accurately position the expected location in the call area. However in the case of mountain rescue it is difficult to rescue the victim in golden time because the location of the search area cannot be limited when the victim is located in a radio shadow area of the mountain or the device power is off and this situation become worse if victim fail to report 911 by himself due to the injury. In this paper, we are expected to solve the previous problem by propose the mobile telecommunication forensic simulator consist of time series of cell information, human mobility model which include some general and specific features (age, gender, behavioral characteristics of victim, etc.) and intelligent infer system. The results of analysis appear in heatmap of polygons on the map based on the probability of the expected location information of the victim. With this technology we are expected to contribute to rapid and accurate lifesaving by reducing the search area of rescue team.

Expert Testimony in Litigation of Sexual Violence against People With intellectual disabilities (지적장애인 성폭력 사건 재판에서 전문가 참여제도 활용 실태)

  • Yi, Mi Sun
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.1
    • /
    • pp.1-13
    • /
    • 2021
  • This study analyzed the use of expert reports in the investigations and trials of cases of sexual violence against people with intellectual disabilities. A total of 670 alleged sexual assault cases against victims with intellectual disabilities were analyzed. Results showed that 97.5% of the cases included at least one expert report. In most cases(91%), the expert reports of statement validity assessment were included. Additionally, doctor's note (41.1%) from obstetricians and Psychiatrists, intermediary reports(36%), and expert witnesses(psychologists') reports (9.5%) were included. In 80 cases (44.4%) of the 180 cases in which a victim' statement credibility was in question during the trial, judges cited the expert's reports of statement validity assessment as the basis for the judgment on the reliability of the victims' accusation. The frequency of citing the report was higher when the victim was under the age of 13, or when the defendant was found guilty. Regrading the report content, the evaluations of criteria-based content analysis(CBCA) was most frequently cited, while the victim's psychological status, cognitive limitation, as well as possibile contamination of victim's account, were also mentioned in the ruling statements. Results showed agreement between experts' statement validity assessments and judges' determinations in 79 cases out of the 80 cases Finally, this study discussed ways to utilize expert options.

  • PDF

The Serial Multiple Mediation Effect of Smart-media Addiction and ADHD-related Behaviors on the Relation between the Maternal Parenting Behavior and Children's Prosocial Behavior (어머니의 역기능적 양육행동과 아동의 친사회적 행동의 관계에서 아동의 스마트미디어 중독과 ADHD관련문제의 직렬다중매개효과)

  • Sung-eun Baek
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.229-235
    • /
    • 2023
  • This study was to examine the role for children's prosocial behavior in terms of maternal parenting behavior, smart-media addiction and ADHD-related behaviors. The study sample was 537 children who had participated in the tenth wave of the Panel Study on Korean Children. The data were analyzed for descriptive statistics, correlation, and serial multiple mediation analysis. The results of this study are as follows. First, it was found that the direct effect of maternal parenting behavior on children's prosocial behavior was not significant. Second, in the relationship between the maternal parenting behavior and the children's prosocial behavior, the mediating effects of smart-media addiction and ADHD-related behaviors were significant, respectively. Third, in the effect of maternal parenting behavior on children's prosocial behavior, it was found that smart-media addiction and ADHD-related behaviors mediate it in series. These results provide to a better understanding of the process between maternal parenting behavior to children's prosocial behavior and especially emphasize the importance of smart-media addiction and ADHD-related behaviors.