• Title/Summary/Keyword: 피해자정보보호

Search Result 48, Processing Time 0.023 seconds

The Co-Occurrence of Domestic Violence and Child Maltreatment : Perspective from Child Protection Services (아동학대와 가정폭력의 중복발생 연구 : 아동보호서비스의 관점)

  • Kim, Kihyun;Kim, Yong-Hoi;Kim, Kyung-Hee
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.4
    • /
    • pp.221-249
    • /
    • 2018
  • This study examined the co-occurrence of child maltreatment and domestic violence in South Korea, using the administrative data from Korean Child Protection Services. Existing literature showed that the co-occurrence rate was high and that the co-occurrence was important in prevention and intervention for child maltreatment. However, few studies have investigated the co-occurrence of child maltreament and domestic violence in South Korea. None of the studies have examined the co-occurrence from the perspective of child protective services. This study analyzed the rate of co-occurrence among abusive families involved with Korean Child Protective Services and examined the relationship between domestic violence and child maltreatment. Results showed that 21.4% of the abusive families had also experienced domestic violence. Various characteristics(i.e., detailed abuse characteristics, psychosocial characteristics of perpetrators) differed between co-occurrence families and maltreatment-only families. Domestic violence was a significant predictor of child maltreatment, but the detailed relationships differed according subtypes of maltreatment. Based on the results, implications for theory and service integration between services for domestic violence victims and child protective services were discussed.

One-Time Virtual Card Number Generation & Transaction Protocol using Integrated Authentication Center (통합인증센터를 활용한 일회용 가상카드번호 생성 및 결제서비스 프로토콜)

  • Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.9-21
    • /
    • 2010
  • Recently, famous online shopping websites were hit by hacking attack, and many users' personal information such as ID, password, account number, personal number, credit card number etc. were compromised. Hackers are continuing to attack online shopping websites, and the number of victims of these hacking is increasing. Especially, the exposure of credit card numbers is dangerous, because hackers maliciously use disclosed card numbers to gain money. In 2007 Financial Cryptography Conference, Ian Molly et al. firstly proposed dynamic card number generator, but it doesn't meet reuse resistant. In this paper, we analyzed security weaknesses of Ian Molly's scheme, and we proposed a new one-time virtual card number generator using a mobile device which meets security requirements of one-time virtual card numbers. Then, we propose one-time credit card number generation and transaction protocol using Integrated Authentication Center for user convenience and security enhancement.

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

A New Investigation Methodology of Marine Casualties and Incidents using Digital Forensic Techniques (디지털 포렌식 기법을 이용한 해양사고 조사 방법론)

  • Baek, Myeong-Hun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.515-530
    • /
    • 2013
  • The results of investigations into marine incidents have become an important basis in determining not only possible causes, but also the extent of negligence between the perpetrator and victim. However, marine incidents occur under special circumstances i.e. the marine environment, and this leads to difficulties in identifying causes due to problems in scene preservation, reenactment and acquisition of witnesses. Given the aforementioned characteristic of marine incidents, the International Convention for the Safety of Life at Sea (SOLAS) has adopted mandatory regulations on the carriage of Voyage Data Recorders (VDRs) and Automatic Identification Systems (AIS) for ships of a certain gross tonnage and upwards, so as to reflect recent developments in radio communication and marine technology. Adopted to provide an international standard for investigations and to promote cooperation, the Code of the International Standards and Recommended Practices for a Safety Investigation into a Marine Casualty or Marine Incident (Casualty Investigation Code) recommends member states to build capacity for analysis of VDR data. Against this backdrop, this paper presents methods for efficient investigations into the causes behind marine incidents based on data analysis of VDR, which serves as the black box of ships, as well as digital forensic techniques.

Effect of Childhood Abuse Experience on Gender Role Attitude : Focusing on the moderating effect of social support

  • Lee, Ji-woo;Choe, Eun-hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.227-235
    • /
    • 2021
  • The purpose of this study is to investigate the characteristics of childhood abuse experience, analyze factors affecting gender role attitudes, find out the moderating effect of social support, and suggest preventive measures and alternatives for childhood abuse experiences. proceeded. This study was conducted by the Ministry of Gender Equality and Family, through a domestic violence survey conducted every three years in accordance with the 「Act on the Prevention of Domestic Violence and Victim Protection, etc.」 Analysis was performed on 4,546 people and 4,514 men. As a result, it was found that childhood abuse experience had a negative (-) effect on gender role attitudes, and the analysis of the moderating effect of social support also showed a negative (-) effect. In the future, it is necessary to strengthen awareness of childhood abuse prevention and child protection from the beginning of life, and it is suggested that the level of children's parental education and social support and sufficient measures be prepared for future research.

Effects of Self-Administered Interview on Correct Recall and Memory Protection in the Situation of Delay and Misinformation (시간 지연과 오정보 제시 상황에서 초기 자기기입식 면담(SAI)이 정확 회상과 기억 보호에 미치는 영향)

  • Ham, Keunsoo;Kim, Yeaseul;Kim, Kipyung;Jeong, Hojin
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.1
    • /
    • pp.1-20
    • /
    • 2020
  • Witnesses will be exposed to a variety of misinformation after the witnessing of the event and state at the scene of the investigation after the delay period. This study was conducted to promote correct recall reporting without being affected by factors that against correct recall. Self-Administered Interview(SAI) is known to obtain eyewitness accounts quickly and accurately. Therefore, we performed a SAI to see if it reported more information than the control group that did not perform the SAI. Also, it also performed that correct information was maintained without being affected by misinformation and delay. Eighty-eight participants were asked to perform SAI or game after showing a video of mock crime. Misinformation was presented in the first or second session to see if it affected recall. An analysis of responses from the final test conducted in the second session by participants showed that groups that conducted SAI after a four-week delay reported more correct information than control groups, while there was no difference between incorrect- and confabulation information. In particular, the timing of presenting misinformation did not affect the amount of recall. This suggests that conducting the SAI immediately after witnessing the event protects correct information even after four weeks. Finally, the significance and limitations of this study, and subsequent studies were discussed.

  • PDF

A Study on the Violation of Probation Condition Determinants between Sex Offenders and Non-Sex Offenders (성범죄자와 일반범죄자의 보호관찰 경고장 관련 요인 비교)

  • Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.205-230
    • /
    • 2015
  • This study aims to compare the differences of crucial factors that are associated with probation warning tickets between sex offenders and non-sex offenders in South Korea. Serious high-profile cases have occurred in recent years which resulted in public and political conners for successful sex offender management and monitoring strategy through community corrections. The official response has been to initiate a series of legislative probation and parole measures by using GPS electronic monitoring system, chemical castration, and sex offender registry and notification. In this context, the current study is designed to explore the major factors that could affect the failure of probation by comparing the differences between sex offenders and non-sex offenders in terms of their major factors which are related to the failure of probation. The failure of probation is measured by the number of warning tickets which would be issued when there is the violation of probation conditions. The data is obtained from Seoul Probation office from January, 29, 2014 to February, 28, 2014. The sample number of sex offenders is 144 and the number of non-sex offenders is 1,460. The data includes the information regarding the offenders who completed their probation order after they were assigned to Seoul Probation in 2013. Furthermore, this study uses the chi-square and logistic regression analysis by using SPSS statistical package program. The result demonstrated that only prior criminal history was statistically significant factor that was related to the number of warning tickets in the sex offender group when other variables were controlled($X^2=25.15$, p<0.05, Nagelkerke $R^2=0.23$)(b=0.19, SE=0.08, p<0.05). By contrast, there were various factors that were associated with the number of warning tickets in non-sex offender group. Specifically, the logistic regression analysis for the non-sex offenders showed that demographic variable(marital status and employment type), offender-victim relationships, alcohol addiction, violent behavior, prior criminal history, community service order, and attendance order were statistically significant factors that were associated with the odds of warning tickets. Further policy implication will be discussed.

  • PDF

A Study on the Effective Countermeasure of SPAM : Focused on Policy Suggestion (불법스팸 방지를 위한 개선방안 : 정책적 제안을 중심으로)

  • Sohn, Jong-Mo;Lim, Hyo-Chang
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2021
  • Today, people share information and communicate with others using various information and communication media such as e-mail, smartphones, SNS, etc. However, it is being used in malicious attacks to send a large amount of illegal spam or to use it for fraud by using illegally collected personal information and devices that are vulnerable to security. Illegal spam, smishing, and fraudulent mail(SCAM) cause a lot of direct and indirect damage to companies and users, including not only social costs such as mental fatigue, but also unnecessary consumption of IT infrastructure resources and economic losses. Although there are regulations related to spam, violators of the law are still on the rise by circumventing the law, and victims are constantly occurring, so it is necessary to review what the problem is. This study examined domestic and foreign spam-related regulations and spam-related response activities, identified problems, and suggested improvement countermeasures. Through this study, it was intended to suggest directions for improving spam-related systems in order to block illegal spam and prevent fraudulent damage.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.