• Title/Summary/Keyword: 특정범죄

Search Result 120, Processing Time 0.021 seconds

A Study Related on Relationship between New Terrorism's and Security Strategy for Korea (뉴테러리즘의 민간시큐리티 연계와 발전방안)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.1-13
    • /
    • 2008
  • Conclusion is like below. First, as a private security area's mutual relationship and development device, it is necessary to bring up corresponding-terror expert. Second, a privatized corresponding-terror research center is necessary. Third, the importance of privatization's role for the corresponding-terror prevention law establishment. It is considered that a diversified examination research that can minimize a violation of human rights by bringing up various corresponding-terror expert, paradigm shift of workers related security area, and construct corresponding- terror education equipment as well as education content, it is not a special group's authority, should be continued by a following research. Academical area of terrorism's construction is necessary. You need to approach by private initiatively boldly with the academic world as an active mutual cooperation politically, culturally, socially, internationally, etc, rather than developing national institute initiatively. Also, in a following research, an academical research about a correlation of crime, war, terror should be done deeply, variously. It is necessary to establish an academic foundation of terror study.

  • PDF

A Database Forensics Model based on Classification by Analysis Purposes (분석 목적별 분류기반의 데이터베이스 포렌식 모델)

  • Kim, Sung-Hye;Kim, Jang-Won;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.63-72
    • /
    • 2009
  • Digital forensics refers to finding electronic evidences related to crimes. As cyber crimes are increasing daily, digital forensics for finding electronic evidences is also becoming important. At present, various aspects of digital forensics have being researched including the overall process model and analysis techniques such as network forensics, system forensics and database forensics for digital forensics. Regarding database forensics, only analysis techniques dependent on specific vendors have been suggested. And general process models and analysis techniques which can be used in various databases have not been studied. This paper proposes an integrated process model and analysis technique for database forensics. The proposed database forensics model (DFM) allows us to solve problems and analyze databases according to the situation and purpose, and to use a standard model and techniques for various database analyses. In order to test our model(DFM), we applied it to various database analyses. And we confirmed the results of our experiment that it can be applicable to acquisition in the scene as well as analysis of data relationships.

A Study on the Operational Problems and Improvement Plan of the Domestic Violence Punishment Act through Domestic Violence Crime Information Analysis

  • Yoon, Hyun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.227-232
    • /
    • 2021
  • The 「Act on Special Cases concerning the Punishment of Crimes of Domestic Violence」 still has various problems in the legal system and enforcement process. Contrary to the original intention of the legislation, it is operated very passively in terms of state intervention and punishment of domestic violence actors in actual operation. Even if it is treated as a home protection case, if you look at the details of the protection disposition, there is a problem that the decision on the protection disposition is biased towards a specific type of protection disposition. In order to improve this, the need for cooperation and active intervention between state agencies is required. In addition, it is necessary to establish a legal basis for a request for personal protection by recognizing the status of a victim who reported domestic violence as a crime reporter. In addition, in order to secure the effectiveness of the protective disposition, it is necessary to strengthen sanctions for non-compliance or violations of the protective disposition.

A Study on Legislation for the Efficient Management of Private Investigation(PI) Industry in Korea (탐정 산업의 효율적 관리를 위한 법제화 연구)

  • Jun Ho Sun;Sang Min Kim;Keon Ryeong Yeom
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.157-164
    • /
    • 2023
  • Since there are no related laws and regulations in the Korean private investigation industry, anyone can freely operate it if they report the business to the tax office. The reality is that companies hire PI to investigate rival companies and employees for specific reasons, as they generally rely on individual requests. The Korean PI industry is divided into two parts. The first are retired police officers and investigators who have experience in criminal investigation. The second are private citizen who can conduct investigation service activities runs a PI agency after everyone has registered with the tax office. It is no exaggeration to say that the current legal conflicts and legal problems that arise in the PI service cannot be ruled out because civilians are relatively less knowledgeable than PIs and legal experts. Therefore, in order for PI industry to operate stably in Korea, we will first study the concept and type of PI industry, comparative analysis of past PI laws, current status and reality of PI industry, and study the current status and references.

Reexamination of the Cyber Insult Crime For securing the Internet Ethics (인터넷윤리 확보를 위한 사이버모욕죄의 재검토)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.111-120
    • /
    • 2013
  • Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.

Improving the Biography Archive Service of Wikipedia (위키피디아 인물 아카이브 서비스 개선을 위한 분석 연구)

  • Choi, Sanghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.1
    • /
    • pp.447-467
    • /
    • 2018
  • Biographical information about people is usually collected and provided by a company or an institute which has a specific standard to select people for service. Recently, user oriented contents service like Wikipedia has started biographical information service, Wikipedia Biography Portal, in which users select people and freely describe about them. This study collected 500 biographical data from three categories of Wikipedia biography portal such as criminals, faculty, and directors. The contents of data from each category were analyzed with the word frequency and the divergence indicator to identify the characteristics of each category. As a result, divergency indicator is effective to represent the differential factors of each category. This study provides word clouds of top 100 word with divergence indicator and top 100 common words of three categories with word frequency as a guide for users to write about a person in these categories and for editors to accept and monitor the biography from users.

Development of Real-time Video Search System Using the Intelligent Object Recognition Technology (지능형 객체 인식 기술을 이용한 실시간 동영상 검색시스템)

  • Chang, Jae-Young;Kang, Chan-Hyeok;Yoon, Jae-Min;Cho, Jae-Won;Jung, Ji-Sung;Chun, Jonghoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.85-91
    • /
    • 2020
  • Recently, video-taping equipment such as CCTV have been seeing more use for crime prevention and general safety concerns. Since these video-taping equipment operates all throughout the day, the need for security personnel is lessened, and naturally costs incurred from managing such manpower should also decrease. However, technology currently used predominantly lacks self-sufficiency when given the task of searching for a specific object in the recorded video such as a person, and has to be done manually; current security-based video equipment is insufficient in an environment where real-time information retrieval is required. In this paper, we propose a technology that uses the latest deep-learning technology and OpenCV library to quickly search for a specific person in a video; the search is based on the clothing information that is inputted by the user and transmits the result in real time. We implemented our system to automatically recognize specific human objects in real time by using the YOLO library, whilst deep learning technology is used to classify human clothes into top/bottom clothes. Colors are also detected through the OpenCV library which are then all combined to identify the requested object. The system presented in this paper not only accurately and quickly recognizes a person object with a specific clothing, but also has a potential extensibility that can be used for other types of object recognition in a video surveillance system for various purposes.

Moving Object Detection using HSV on Auto Correction Camera (자동보정 카메라에서 HSV를 이용한 이동객체 검출)

  • Lee SeungCheol;Lee GueeSang;Choi Deokjai;Kim SooHyung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.910-912
    • /
    • 2005
  • 영상감시기술은 공공장소의 사랑 행동패턴 분석을 통한 범죄 예측, 실내 환경에서의 사람의 출입여부 확인, 다중 카메라에서의 특정 이동객체 추적 등 다양하게 이용되고 있다. 또한 유비쿼터스 환경에서 영상센서로 사용 될 수 있다. 영상감시기술에서는 입력된 영상을 여러 과정을 통하여 분석 하게 된다. 여러 과정 중 이동 객체의 정확한 분석을 위해서는 효과적인 이동객체 검출 방법이 필요하게 된다. 어떤 감시카메라는 객체가 감지되었을 때 감지된 영상을 자동으로 보정한다. 이와 같이 자동보정 카메라에 입력된 영상을 분석할 경우 보정된 정도에 따른 영상처리가 필요하게 된다. 이동객체 검출 단계는 배경영상 모델링, 이동객체 검출, 그림자 제거 단계로 나눌 수 있다. 이 같은 과정 중에 감지된 영상의 자동보정 정도를 측정하고 영상 분석시 측정값을 적용하게 된다. 보정 정도를 적용한 방법과 하지 않은 방법 중에 적용한 방법이 더욱 정확한 검출 정도를 나타냈으며, 검출된 이진 이미지의 개선을 위한 과정 중 Reconstruction의 형태학적 영상처리 방법을 적용하여 기존의 검출 방법보다 향상된 결과 영상을 획득할 수 있었다. 이렇게 검출된 이동객체의 분석을 통해 보다 향상된 분석을 할 수 있게 되며, 차후 유비쿼터스 환경에서의 영상 센서로 사용 될 수 있다.

  • PDF

Activation of Culture and Content Industry and Necessity of Security Industry & Concert Hall Safety (문화콘텐츠 산업의 활성화와 공연장 안전 및 보안 산업의 필요성)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.55-63
    • /
    • 2016
  • The purpose of this study is that there viewing at the future development direction and awareness of the cultural contents industry targeting college students for the activation of the domestic cultural content industry. And we want to find the need of the security industry & Concert Hall Safety. Recent worldwide it has occurred 'Soft target' terror targeting unspecified civilian in the cultural space of theater and music venues, stadiums etc. But security and safety systems against terror in Korea are very deficient situation. US security market has increased sales significantly interest in increasing against crime and terrorism prevention and depending on the price cut and technology development. It is expected to require a security industry in a variety of applications to the cultural contents industry development about Korean pop music and theatrical performances, and internet and mobile games stc.

A Legislative Proposal to Prevent the Infringement of Privacy and to Solve Operational Problems by Drones (드론에 의한 프라이버시 침해 방지 및 운용 상 문제 해결을 위한 입법 제안)

  • Kim, Yongho;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1141-1147
    • /
    • 2017
  • An unmanned aerial vehicle(UAV), commonly known as a drone, is an aircraft without a human pilot aboard, which is operated by wireless device. A drone provides the capability for the aerial search and traffic control as a police equipment. It has benefits for the missions for the aerial photography with the high resolution camera which can replace eye-dependent search processes. Moreover it has advantage of retrieving several times for the recorded videos. However, if the law enforcement agency misuse and overuse a drone for investigations and search missions without certain regulations and principles, it breaches privacy and personal information infringement. In this paper, we issue a lawful challenges on drone operations and discuss solutions to those challenges.