• Title/Summary/Keyword: Crime damage

Search Result 80, Processing Time 0.026 seconds

A Study on the Survey of Requested Contents for Living Safety Web DB (생활안전 Web DB 구축을 위한 콘텐츠 요구조사에 관한 연구)

  • Lim, Dong-Hyeon;Kim, Jin-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.6
    • /
    • pp.9-16
    • /
    • 2010
  • For improving social safety, It is important to build Web DB of criminal prevention and open to the public. It could be help to mitigate social damage of crimes and accidents. In this study, the main goal is to analyze and apply the applicable contents from user demands studies and case studies for a domestic life safety Web DB. For this study 31 cases of international life safety Web DB were collected and analyzed. Customer participation style of Web service was reviewed. And demand survey for crime weakness group like students, and young women was examined. As a results people needed to know the un-safety area in their usual life and their ways; school to home, work to home. While creating the Web DB for domestic life safety, user content according to different economic status and publicity for Web DB proved to be important factors.

Analysis of Mobile Smishing Hacking Trends and Security Measures (Mobile Smishing 해킹 동향 분석 및 보안대책)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2615-2622
    • /
    • 2015
  • Using the mobile device, such as Smartphones tablet PC, online banking and e-commerce, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users. And, in this paper, i propose a secure way and measures of financial damage for mobile Smishing hacking.

A Study on Legal Issues with Airline Over-booking Practice (항공권 초과예약의 법률적 문제에 관한 연구)

  • Jeong, Jun-Sik;Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.143-166
    • /
    • 2012
  • This paper deals in depth with airline over-booking practices and legal questions therefrom in the light of public interests. Chapter I as an introduction gives clear ideas of what are the over-booking, fact-revealing current state of denied boarding and nature of the problems inherent but veiled in those practices. In Chapter II, it is reviewed whether legal instruments for DBC(Denied Boarding Compensation) are adequately equipped for airline passengers in R. O. K. Upon the results of the review that international law to which Korea is a party, domestic law and administrative preparedness for the DBC are either null or virtually ineffective, the Chapter by contrast illustrates how well the U. S. and the E. U. safeguard civil rights of their passengers from such an 'institutionalized fraud' as the over-booking. In Chapter III on which a main emphasis lies, it is examined whether the over-booking practice constitutes a criminal offense: Fraud. In section 1, the author identifies actus reus and mens rea required for fraud then compares those with every aspect of the over-booking. In conjunction with the structural element analysis, he reviews the Supreme Court's precedents that lead the section into a partial conclusion that the act of over-booking judicially constitutes a crime of fraud. Despite the fulfillment of drawing up an intended answer, the author furthers the topic in section 2 by arguing a dominant view from Korean academia taking opposite stance to the Supreme Court. The commentators assert, "To consummate a crime of fraud, there must be property damage of the victim." For this notion correlates with a debate on legally protected interest in criminalization of fraud, the section 2 shows an argument over 'Rechtgut' matters specific to fraud. The view claims that the Rechtgut comes down rather to 'right to property' than 'transactional integrity' or 'fair and equitable principles'. However, the section concludes that the later values shall be deemed as 'freedom in economic decision-making' which are the benefit and protection of the penal law about fraud. Section 3 demonstrates the self-contradiction of the view as it is proved by a conceptual analysis that the infringement on freedom in economic decision-making boils down to the 'property damage'. Such a notion is better grounded in section 4 by foreign court decisions and legislation in its favour. Therefore, this paper concludes that the airline's act of over-booking is very likely to constitute fraud in both theory and practice.

  • PDF

The introduction of a criminal case arbitration on premise the civil and commercial arbitration (민상사(民商事) 중재제도(仲裁制度)를 전제(前提)로 한 형사중재제도(刑事仲裁制度)의 도입방안(導入方案))

  • Nam, Seon-Mo
    • Journal of Arbitration Studies
    • /
    • v.19 no.3
    • /
    • pp.93-119
    • /
    • 2009
  • Nowadays the number of crimes is increasing rapidly and society is getting more and more dangerous. Recently the criminal aspect of our society, the intelligence, diversity, localized area, as well as for the crime victims also difficult to predict the damage recovery is not easy to change their level of pain and are also serious. This phenomenon is increasingly expected to intensify, the proper response is a factory. The more so if the victim of murder. The criminal mediation working on the operational adjustments Borrower payment, Construction charges, investments and financial transactions due to interpersonal conflicts that occurred as a fraud, embezzlement, breach of trust property crimes such accused, individuals between the defamatory, offensive, encroachment, violating intellectual property rights and private Disputes about the complaint case and other criminal disputes submitted to mediation to resolve it deems relevant to the case who are accused. But the core of a detective control adjustment, adjust the members' representative to the region, including front-line player or a lawyer appointed by the attorney general at this time by becoming parties to this negative view may be ahead. Some scholars are criticizing the current criminal justice system for the absence of proper care for the criminal victims, as an alternative to the traditional criminal justice system. The introduction of the summary trial and related legal cases, the command structure, compensation system, crime victims' structural system can be seen as more classify, crime subject to victim's complaint, By case with a criminal misdemeanor in addition to disagree not punish criminal, minor offense destination, traffic offenders, regular property crime, credit card theft, intellectual property rights violators can be seen due to more categories can try. They sued in law enforcement, Prosecution case has been received and if any one party to the criminal detective Arbitration request arbitration by the parties can agree to immediately contact must be referred to arbitration within 15 days of when the arbitration case will be dismissed. These kinds of early results of the case related to, lawyers are involved directly in the arbitration shall be excluded. Arbitration system is the introduction of criminal justice agencies working to help resolve conflicts caused by adjustment problems will be able to. This article does not argue that we should stick to the traditional justice system as a whole. Instead it argues that the restrictive role of the traditional justice is to be preserved.

  • PDF

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.

A Study on Mobile Forensic Extraction Methods of Cellular and Smart Phone (휴대폰과 스마트폰의 모바일 포렌식 추출방법 연구)

  • Yi, Jeong Hoon;Park, Dea Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.79-89
    • /
    • 2010
  • Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented.

A Study on the Sectoral Spread of Arbitration in Korea: Focusing on the Introduction of Criminal Arbitration (한국중재의 분야별 확산에 관한 검토 - 형사중재의 도입을 중심으로 -)

  • Nam, Seon-Mo
    • Journal of Arbitration Studies
    • /
    • v.22 no.3
    • /
    • pp.1-23
    • /
    • 2012
  • Defamation on the Internet is a criminal offense. Of late, the damage it has been causing has grown exponentially. Here, we suggest some ideas to expand the use of arbitration in Korea. We suggest that all disputes arising in connection with current contracts be settled under the rules of conciliation and arbitration. As a countermeasure to the requirements for defamation or damages, the field of criminal arbitration regulations needs to be defined strictly. In conclusion, the UK does not make provisions for arbitration as a specific subject. With respect to foreign legislation, it is necessary to take a look at ways to expand arbitration in our country. The scale of arbitration must be expanded to allow for greater protection of criminals in exchange for their cooperation in arbitration cases and relative to the amount of the damages in dollars. There must also be detailed instructions regarding the eligibility criteria for and proper handling of these arbitration cases.

  • PDF

A Network Transport System Using Next Generation CCN Technology

  • Lee, Hyung-Su;Park, Jae-Pyo;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.93-100
    • /
    • 2017
  • Current internet has evolved from the sharing and efficiency aspects of information, it is still vulnerable to the fact that the Internet is not secure in terms of security and is not safe to secure of security mechanism. Repeating patches on continuous hacking are continuously demanding additional resources for network or system equipment, and consequently the costs continue to increase. Businesses and individuals alike are speeding up the damage caused by crime like of ransomware, not jusy simple attacks, and businesses and individuals need to respond to cyber security. In addition, the ongoing introduce of security device, and separate of networks for secure transmission of contents in the existing TCP/IP system, but it is still lacking in security. To complement the security implications of this existing TCP/IP Internet Protocol, we intend to propose a Secure Contents Transport System (SCTS) on the network using the CCN concept.

A Study on Damage and Countermeasures of SMS Phishing (스미싱의 피해와 대응방안에 관한 연구)

  • Kim, Jang Il;Lee, Heui Seok;Kim, Ji Ung;Jung, Yong-Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.1
    • /
    • pp.71-78
    • /
    • 2015
  • Created, but the development of mobile devices to have a margin of life have appeared in the opposite forces that are considered to be the target of financial crime and attacks them. Financial crime among crimes that target the smartphone SMS phishing, phishing, pharming, phishing, etc. voice and, in particular, a phenomenon that is growing a lot of SMS phishing is by nature a text message to your mobile. Ye Jin proactive rather than post responses in order to be safe from the SMS phishing attack individuals and businesses, and asset protection is even more important in the country. For this, the SMS phishing attack detected in advance and that can block the development program, it is necessary to deploy.

A Study on the Hazard and Risk Analysis of Hospital in Korea - Focused on Local Medical Centers (의료기관의 위험도 분석 조사 - 지역공공의료원을 중심으로)

  • Kim, Youngaee;Song, Sanghoon;Lee, Hyunjin;Kim, Taeyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.4
    • /
    • pp.31-39
    • /
    • 2022
  • The purpose of this study is to analyse the hazard risk by examining the magnitude and severity of each type of hazard in order to mitigate and prepare for disasters in medical facilities. Methods: The hazard risk analysis for hazard types was surveyed for team leaders of medical facilities. The questionnaire analyzed data from 27 facilities, which were returned from 41 Local Medical Centers. Results: When looking at the 'Risk' by category type of hazard, the influence of health safety and fire/energy safety comes first, followed by natural disaster, facility safety, and crime safety. On the other hand, as for 'Magnitude', facility safety and crime safety come first, followed by health safety, fire/energy safety, and natural disasters. Most of the top types of disaster judged to have high hazard in medical facilities are health types. The top five priorities of hazard in medical facilities, they are affected by the geographical and industrial conditions of the treatment area. In the case of cities, the hazard was found to be high in the order of infectious disease, patient surge, and wind and flood damage. On the other hand, in rural areas, livestock diseases and infectious diseases showed the highest hazard. In the case of forest areas, the hazard was high in the order of wildfire, fire accident, lightning, tide, earthquake, and landslide, whereas in coastal areas of industrial complexes, the hazard was high due to fire, landslide, water pollution, marine pollution, and chemical spill accident. Implications: Through the research, standards will be established for the design of hospitals with disaster preparedness, and will contribute to the preparation of preemptive measures in terms of maintenance.