• Title/Summary/Keyword: 범죄 행위

Search Result 250, Processing Time 0.031 seconds

Abrupt scene detection technique using histogram operation (히스토그램 연산을 이용한 급격한 장면의 검출 기법)

  • Shin, Seong-Yoon;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.425-426
    • /
    • 2022
  • Many CCTVs are installed around the area for the purpose of preventing crime. In this case, it is necessary to sound an alarm when a specific situation occurs because many people cannot be watching CCTV. It is necessary to analyze the video data to determine what kind of behavior it is. In this study, we propose a scene change detection technique through histogram operation, paying attention to the change of the histogram due to a sudden movement.

  • PDF

Created Time of File and Log Abusing Unreliable System Time and a Solution (시스템 시간을 악용한 신뢰할 수 없는 파일과 로그의 생성시간과 해결 방안)

  • Yoon, Se-Won;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.382-385
    • /
    • 2010
  • 컴퓨터가 우리 생활에 밀접하게 관련된 만큼 각종 범죄에서도 컴퓨터와 관련된 사건이 증가하고 있다. 범죄와 관련된 컴퓨터에서 법정에 제출하기 위해 증거를 분석하고 제출하는 과정을 디지털 포렌식이라 한다. 대표적인 포렌식으로는 사용자의 행위를 기록한 로그 분석이 있다. 반대로 증거 분석을 방해하는 과정을 안티 디지털 포렌식이라 한다. 본 논문에서는 시스템 시간을 변경해 로그 기록시간을 허위로 기록할 수 있는 가능성과 해결 방안을 알아본다.

  • PDF

e-Team-정책개발단 법제분석팀

  • Korea Information Security Agency
    • 정보보호뉴스
    • /
    • s.125
    • /
    • pp.22-23
    • /
    • 2008
  • 사무실에 몰래 들어가 기업의 중요 사업 문서를 훔친다면. 인쇄매체를 통해 아무런 근거없이 특정인을 비방한다면. 혹은 남의 물건을 자기 것인 것처럼 타인을 속인다면. 이 모든 것은 분명 범죄이고, 또 그에 상응하는 처벌을 받게 된다. 그리고 그 사실을 우리 모두는 잘 알고 있다. 하지만 유사한 행위라도 사이버 공간에서는 범죄처럼 인식되지 않거나 애써 무시되는 경우가 많다. 이 같은 현실은 사이버 공간의 특성을 이해하고, 이를 위한 체계화된 법률과 교육이 필요하다는 것을 의미한다. 그러나 급변하는 IT 환경에서는 이 같은 노력이 쉽지만은 않다. 정책개발단 법제분석팀은 그래서 더 바쁘다.

  • PDF

A Study on Computer Forensics Technology (컴퓨터 포렌식스 기술에 관한 연구)

  • 홍성욱;서영선;송정환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.523-532
    • /
    • 2003
  • 컴퓨터 포렌식스(Computer Forensics)란 컴퓨터 범죄자료가 법적 증거물로써 제출될 수 있도록 증거의 확인, 복사, 분석 등 일련의 행위를 하는 것을 말한다. 컴퓨터에서 각종 증거자료를 추출하기 위해서는 컴퓨터 특성 이해와 고도의 보안기술을 갖추지 않으면 실제로 증거자료가 존재함에도 불구하고 그냥 간과해 버릴 수도 있다. 본 논문에서는 컴퓨터 범죄를 소개하고 컴퓨터 포렌식스의 소요 기술을 분류하며, 컴퓨터 포렌식스 기술에서 중요한 부분을 차지하고 있는 삭제된 파일 복구기술에 대하여 고찰한다.

  • PDF

Preventing Subway Crimes : Focusing on Sexual Offenses in the Seoul Metropolitan Subway (지하철범죄 예방전략 : 서울 지하철의 성범죄를 중심으로)

  • Roh, Sung-Hoon;Kim, Hak-Kyong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.190-205
    • /
    • 2012
  • The purpose of the paper is to provide policy suggestions for effectively tackling subway crimes, based on the UK and USA's crime control strategies and systems of subway crimes. The paper attempts to analyze the characteristics of subway crimes in Seoul Subways, and discovers that many of the crimes on the subways are basically 'opportunistic' crimes. In particular, crime statistics of Seoul Subways clearly show that sexual-related crimes are on the sharp increase. In this context, it is of great essence that official vigilance functions should be strengthened in order to eliminate crime opportunities in Seoul Subways. Based on such an analysis - in particular, focusing on official surveillance and response capabilities of subway passengers - the paper finally presents policy recommendations as follows: 1) an increase in the number of police officers of the Subway Police Squad, 2) an increase in the number of CCTV cameras and their effective use, 3) the development of subway riders' defence abilities, 4) strong law enforcement against minor disorder offences based on zero-tolerance policing, and 5) the reinforcement of community partnerships.

A Study on the insurance crime using a false hospitalization (허위입원을 이용한 보험범죄에 대한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.79-87
    • /
    • 2015
  • In order to clearly recognize illegality of insurance crime, declaring the provisions on insurance crime is preferable. An insurance fraud differentiated from Configuration Requirements of general fraud should be established And differentiation in accordance with the act type of insurance crime the degree of organizational involvement is required. Also the introduction of civil sanctions and creation of additional punishment provision about Organized insurance fraud are required. To notice duplicate insurance when sign up life insurance, the revision of the provisions is required. To limit unnecessary long-term hospitalization, hospitalization standard is required. Introduction of private investigator is required as a method for endowing with investigation to the staff of insurance companies. By providing information sharing laws between relevant agencies including insurance companies and law enforcement agencies, the foundation of information database, and the introduction of SNA Techniques in the IFAS,, you can detect Organized collusion crime.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

A Study on the Maritime Police Authority of Korea Coast Guard on the High Seas of International Law (국제법상 공해에서의 우리나라 해양경찰권에 관한 연구)

  • Son, Yeong-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.121-134
    • /
    • 2019
  • The areas be affected maritime police authority of the Republic of Korea, are largely classified as inland waters, territorial waters, exclusive economic zone and continental shelf(hereinafter referred to as "domestic sea area") and high seas. Of these, the maritime police authority in domestic sea area follows a municipal law that accommodates the United Nations Convention on the Law of the Sea(UNCLOS). In addition, this Convention shall apply on the high seas. Meanwhile, on the high seas, foreign vessels other than domestic vessels are allowed to be subject to limited jurisdiction only for the anti-mankind criminal acts, such as piracy etc. this is in accordance with the principle of "Freedom of the high seas" and "maritime flag state," under this Convention. However, the illegal acts of foreign vessels that threaten the security of coastal states and the safety of ships on the high seas can cause many types of crimes other than anti-mankind criminal acts, and the jurisdiction of the coastal states exercised may lead to conflicts between countries. Therefore, this article would like to suggest a plan for institutional improvement to maintain international maritime order on the high seas and secure maritime police authority in coastal states.

A Study on Violence and Countermeasures on Cyberspace Corruption (부패범죄의 현황과 대책연구:사이버폭력을 중심으로)

  • Kim, Taek
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.51-58
    • /
    • 2019
  • This study focused on violent act, such as verbal offensive and other acts of violence such as cyber bullying, personal information infringement. Online bullying is seriously taking place online, as juvenile violence is seriously debated due to recent school violence. In particular, it is necessary to seek countermeasures by considering the nature of cyber violence in cyberspace, particularly when stalking victims in cyberspace have died from stalking. The study examines the problem of defamation and defamation of character and tries to identify problems. Measures were taken to enact cyber defamation laws. To this end, the Commission analyzed cases of defamation and defamation of character and considered legal precedents. The study intends to study cyber defamation and defamation of character. First, I want to differentiate between cyber libel and defamation of character. Second, I intend to raise the need for cyber defamation of cybercrime and consider the offence of contempt for the criminal justice system. Third, seek ways to protect against cyber defamation and defamation of character.

CHARACTERISTICS OF DETAINED DELINQUENT ADOLESCENTS AND VARIABLES RELATED TO THE REPEATED CRIME DURING 6 MONTHS AFTER RELEASE (구속된 비행 청소년들의 특성 및 석방 후 6개월간 재범여부와 관련된 변인)

  • Kim, Won-Sik;Koh, Seung-Hee;Koo, Yong-Jin;Kim, Hong-Chang;Suh, Dong-Hyuck;Chung, Sun-Ju
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.10 no.2
    • /
    • pp.201-211
    • /
    • 1999
  • Objectives:This study investigated the characteristics of detained delinquent adolescents and variables related to the repeated crime during 6 months after release. Methods:The socio-demographic and crime-related characteristics of 73 detained adolescents were evaluated by semi-structured interviews and police records, and the psychological characteristics of them measured by the MMPI. We also compared the characteristics between subjects with and without repeated crime during 6 months after release. Results:1) Most of detained adolescents had families with low socioeconomic status(77%) and broken families(48%). Sixty-six percent of them were dropped out of school. The most frequent crime pattern was theft(49%), and with accomplice(77%). Seventy-five percent of total subjects had the records of previous conviction. Of the previous convictions, seventy-eight percent was same with the present crimes. 2) Subjects with repeated crime during 6 months after release were younger and had higher T-score on Pa scale of MMPI than the subjects without repeated crime. More adolescents with repeated crime had broken families than those without repeated crime. They also showed the crime-related characteristics of higher percent of theft among crime patterns, higher incidence of previous conviction, younger age of the first crime, and shorter crime-free duration from the last to present crime. Conclusion:These results of present study suggest that the development and the persistence of adolescent delinquency would be resulted from interaction of factors of individual, family, school, and community. By the comparison between subjects with and without repeated crime, it was found that familial dysfunction, younger age at first crime, presence of previous conviction might be the risk factors for repeated delinquency. To prevent repeated crime of delinquent adolescents more effectively, early therapeutic intervention and the development of programs to help adaptation in school and community would be essential.

  • PDF