• Title/Summary/Keyword: 사이버 범죄 예방

Search Result 49, Processing Time 0.03 seconds

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

An Evaluation Study on the Effectiveness of National Cyber Crime Prevention Education Program: Based on the CIPP Model (CIPP 모형을 활용한 사이버 범죄 예방 교육 프로그램 평가에 관한 연구)

  • Jeong, Hwan-su;Woo, You-ran;Lee, Choong C.
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.9-18
    • /
    • 2019
  • This study investigates the factors affecting the educational satisfaction and the transfer of learning of cyber crime prevention education students in order to confirm the effectiveness of the current education. Based on the CIPP model, we confirmed whether the level of social demand and the level of knowledge in the context evaluation, recency of subjects in the input evaluation and interaction in the process evaluation affect the educational satisfaction and the transfer of learning of the students by conducting the survey for the students. As a result of analysis, it was proved that the level of knowledge, recency of subjects and interaction had a significant relationship with the educational satisfaction and recency of subjects, interaction and educational satisfaction significantly affect transfer of learning. Based on the findings, this study provides a few constructive suggestions to improve the effectiveness of the cyber crime prevention education program.

The application of digital forensic investigation for response of cyber-crimes (사이버범죄의 대응강화를 위한 디지털 포렌식 수사 활용방안)

  • Oh, Sei-Youen
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • This study will show the digital forensic model which fights against cyber-crimes to prepare various cyber-crimes. The digital forensic model will be more useful about the investigation of cyber-crimes and arresting criminals after researching the uses of the digital forensic model and cyber-crime rates in South Korea. This model conduct the standardized data with various languages by the language support system through the digital forensic analyzer. This model will send the data to law enforcement reviewing whether or not we ought to prove criminal charges. Moreover, law enforcement can access the file system to find out admissibility of evidence. And this model simplifies lawful investigation about additional investigation. The data, which is conducted and saved by the digital forensic system, will be helpful to protect against the future crimes because of the data.

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

테마연재 / 스파이웨어 통한 개인정보 유출 심각하다

  • Kim, Yeon-Su
    • Digital Contents
    • /
    • no.5 s.96
    • /
    • pp.78-82
    • /
    • 2001
  • 최근 개인정보 유출 및 컴퓨터 범죄가 정보 역효과로 대두되고 있다. 이에 본지는 정보보호 및 컴퓨터 범죄에 관해서 국내에서는 앞선 연구를 하고 있는 한국 정보보호센터의 김연수 연구원의 연재를 통해 정보보호 및 컴퓨터범죄에 관한 기술 및 유형별 동향 법적 대응등에 관한 폭넓은 고찰을 통해 정보보호와 사이버 범죄의 실상과 예방에 기여하고자 한다.

  • PDF

Trend Analysis of the Factors of Cyber Crime Offences Among Adolescents (시간의 흐름에 따른 청소년 사이버범죄 가해경험 영향요인의 변화에 대한 연구)

  • Shin, Ji-hui;Hong, Myeong-gi;Hwang, Eui-gab
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.87-95
    • /
    • 2022
  • Cyber society formed by the development of the Internet is growing rapidly. The Internet is very convenient for our daily life, but it comes with negative aspects including cybercrime and cyberbullying. Recently, there have been incidents that show cyber criminal techniques of adolescents are getting more sophisticated and ferocious. To cope with this crime problem, it is necessary to analyze the causes that affect cyber crime offences among adolescents. There are numerous studies on cybercrime, but less attention has been given to trend analysis. To fill this void, this study examined how the factors that affected the cyber crime offences among adolescents have been changed over time according to transitions in social structure. Implications for future research and policies for adolescents' cyber crime prevention such as time considered response strategies are discussed based on the findings.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.