• Title/Summary/Keyword: IT Crime

Search Result 785, Processing Time 0.022 seconds

How to extract value from poverty? : an institutional ethnographic critique on the Community Redevelopment Agency of the City of Los Angeles (빈곤으로부터 가치 짜내는 방법 -로스앤젤레스 도시재개발국에 대한 제도민족지적 비판-)

  • Park, Kyong-Hwan
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.2
    • /
    • pp.305-322
    • /
    • 2006
  • An increasing number of cities employ rescaling strategies that not only construct metropolitan production network scaled down from national context, but also tune up new governance to effectively control local geographies of the city. In this context, urban redevelopment has emerged a key 'global' strategy to empower governmental institutions of the city, which not only eliminate such threatening spatial variables as deteriorated housing, working-class ghettos, and crime areas, but also increase and extract exchange value of those spaces. I view such practices a process of 'glurbanization'. This paper investigates how state/city government employs the discourse of urban re/development for 'inventing' poverty at an urban scale: how it institutionalizes the discourse for implementing concrete projects: and how urban institutional apparatus appropriate their discursive practices of redevelopment for their own ends in the city. By particularly focusing on the California Redevelopment Law and the Community Redevelopment Agency of the City of Los Angeles, this paper analyzes the ways in which the law and the agency extract value from what they define 'blight areas' by means of eminent domain and tax increment revenues. For empirical analysis I employ discourse analysis and institutional ethnography. I conclusively argue that the urban spaces stigmatized as 'blight areas' are increasingly entrapped by the urban redevelopment agency, which extracts increased exchange value from the areas and redirects it for supporting external investors, private developers, and the body of the agency itself.

  • PDF

A Web-based System for Real-time Monitoring of Dangerous Objects using RFID (RFID를 이용한 웹 기반의 실시간 위험물 모니터링 시스템 구축 사례)

  • Kim, Ju-Il;Lee, Woo-Jin;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.101-115
    • /
    • 2008
  • Recently in the human society, the crime using small arms has increased. Also, many accidents happen because of incomplete management of chemicals and radiation. Accordingly, it is necessary to manage dangerous objects by tracing the position of dangerous objects and rapidly providing the correct information for them. This paper presents a web-based system for real-time monitoring of dangerous objects using RFID in order to overcome the limitations and problems of current dangerous objects management techniques. In this paper, we define the architecture for web-based dangerous objects monitoring system and the scheme for storing information of a dangerous object in the RFID tag. We also implement the web-based monitoring system and present the execution result of the system. The proposed real-time monitoring system is composed of the dangerous objects monitoring server which manages information of dangerous objects and controls them, the dangerous objects monitoring middleware which is mediator between dangerous objects and the server, the RFID reader which reads information of dangerous objects from RFID tags attached to the objects and the database which stores information, status and position of dangerous object. The proposed system manages diverse dangerous objects such as small arms, radiation and harmful chemicals based on the position of them using RFID, so the user can check dangerous objects when they are checked in and checked out and the user can acquire the real-time position information of them through the system. Furthermore, the user can visually monitor dangerous objects through web browser from any where and at any time because the system is web-based system and it provides graphical user interface.

  • PDF

Police security measures for foreign criminals : Focusing on Suwon (외국인범죄자에 대한 경찰의 치안대책 : 경기도 수원시를 중심으로)

  • Park, Chanhyeok;Seo, Bongsung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.622-633
    • /
    • 2015
  • With recent news reports on violent crimes committed by foreigners, public hatred toward foreign criminals and fear about such crimes are growing, calling into question public safety measures implemented by the police and the immigration system. At the same time, due to globalization and structural changes in the labor market, it is certain that the influx of migrant workers will continue to increase. Against this backdrop, this paper seeks to examine the current status of foreign nationals staying in Korea and their criminal records focusing on Suwon city, and propose public safety measures the police could take with regard to crimes committed by foreigners. Also, the paper looks into public safety measures of the Korea Immigration Service and Suwon city, and suggests short- and long-term measures to prevent crimes committed by foreigners. The paper begins by examining the current public safety measures of the police and Suwon City concerning crimes committed by foreign nationals residing in Korea. Based on such examination, it points out insufficient patrol and investigation personnel as problems, and recommends short- and long-term measures for future improvement. This paper maintains that for the Korean society to successfully deal with the increasing number of foreigners in Korea, the current immigration system and public safety measures of the police will have to change. While the police alone cannot reduce the crime rates at local and national levels, nonetheless, proactive measures by the police are needed given the growing number of migrant workers and immigrants in Korea. Also important are mindset changes not only of relevant authorities, but also of the public. The paper recommends a set of short-and long-term public safety measures the police should institute to efficiently deal with crimes committed by foreigners.

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.

An investigation on the relationship between religion and supports for suicide attacks among citizens in Egypt, Pakistan, and Morocco (종교와 자살테러에 대한 지지의 관계분석: 이집트, 파키스탄, 모로코의 사회조사데이터를 근거로)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.37-65
    • /
    • 2015
  • There has been discussions and investigation on the nexus between religion and citizen's supports for suicide attacks and terrorist groups conducting such acts. In terms of the relationship, there were two potent hypotheses attempting to explain the process and mechanism of the relationship: religious belief hypothesis and coalitional commitment hypothesis. previous studies examined these hypotheses have been carried out across different cultural, religious, and political contexts. Until today, however, there are still lack of concrete evidence, which is generated from empirical studies, supportive evidence for any of these hypotheses. Therefor this study aims to investigate the association between religion and popular support for suicide attacks by using a survey data collected from three middle east countries, Egypt, Morocco, and Pakistan. In analysis, a step-wised regression analysis conducted with a set of variety of variables considered to be related with the association. This study found that variables reflecting religious belief hypothesis, such as prayer to God, religious devotion were unrelated to support for suicide attacks. Yet, prayer time predicted reduced supports for suicide attacks. Further, attendance at religious services, thought to enhance coalitional commitment, predicted support for suicide attacks. Yet, it showed negative association with support for suicide attacks. These findings suggest that regular attendance at religious services and regular prayer have combined effects reducing on the willing to support for suicide martyrdom. However, this study findings affirmatively support for neigher religious belief hypothesis nor coalitional commitment hypothesis. Instead, it suggests the needs for further research examination on the relationship as well as corrections of these hypotheses. Finally, Implications for the research findings for preventing suicide attacks are discussed.

  • PDF

Effects and Limitations of Separating Overlapped Fingerprints Using Fast Fourier Transform (고속 푸리에 변환(fast Fourier transform, FFT)을 이용한 겹친지문 분리의 효과와 한계)

  • Kim, Chaewon;Kim, Chaelin;Lee, Hanna;Yu, Jeseol;Jang, Yunsik
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.377-400
    • /
    • 2019
  • Photography is the most commonly used method of documenting the crime and incident scene as it helps maintaining chain of custody (COC) and prove integrity of the physical evidence. It can also capture phenomena as they are. However, digital images can be manipulated and lose their authenticity as admissible evidence. Thus only limited techniques can be used to enhance images, and one of them is Fourier transform. Fourier transform refers to transformation of images into frequency signals. Fast Fourier transform (FFT) is used in this study. In this experiment, we overlapped fingerprints with graph paper or other fingerprints and separated the fingerprints. Then we evaluated and compared quality of the separated fingerprints to the original fingerprints, and examined whether the two fingerprints can be identified as same fingerprints. In the case of the fingerprints on graph paper and general pattern-overlapping fingerprints, fingerprint ridges are enhanced. On the other hand, in case of separating complicated fingerprints such as core-to-core overlapping and delta-to-delta overlapping fingerprints, quality of fingerprints can be deteriorated. Quality of fingerprints is known to possibly bring negative effects on the credibility of examiners. The result of this study may be applicable to other areas using digital imaging enhancement technology.

A Study on the Integrated Management for Multi-Family Housing Security Guard and General Security Guard (공동주택경비원과 일반경비원의 통합관리에 관한 연구)

  • Lee, Sang Hun
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.27-55
    • /
    • 2018
  • The problem is that even though the cost of apartment buildings and general expenses are the same and similar tasks, there is a significant gap between them in quantity and quality. The apartment security guard needs more professional management in education and various reporting obligations. In particular, the reality of being away from the management and supervision of the National Police Agency, which is in charge of crime prevention and policing resources throughout the nation, is a task that needs to be improved quickly. Although the "security service" is a specialized area for protecting the lives and property of the people, it is managed and operated only in the category of apartment management, just because it is under the jurisdiction of the Ministry of Land, Infrastructure and Transport. This should be integrated into one cost-related law, such as the "Cost Business Act," for management and operation. Although the regulations concerning security guards under the "Joint Housing Management Act" are very limited, they should start discussing the integrated management of apartment security guards and general security guards in view of improvement of their treatment. The most realistic method would be to hire a new general security officer with a security law as a security guard in an apartment building.

Social Psychological Characteristics of Juvenile Offenders (소년범죄자의 사회심리적 성격특성)

  • Koh, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.702-711
    • /
    • 2021
  • In order to examine the type of PAI profile for criminally charged juvenile offenders, the study sought to find out personality types and behavioral characteristics of 251 juvenile offenders and 173 ordinary adolescents from 2018-2020. Looking at the overall profiles of juvenile offenders and ordinary adolescents, we found differences in Infrequency(INF), Mania(MAN), Antisocial Features(ANT), Alcohol problems(ALC), Drug problems(DRG), Aggression (AGG), and Dominance(DOM) and Warmth(WRM). Based on these results, we perform clustering as factors Antisocial features(ANT), Aggression(AGG), and Dominance (DOM) with an average difference of more than five points. It was classified as Cluster 1 with a high percentage of adolescents and Cluster 2 with a high percentage of juvenile offenders, and Cluster 1 was named as a defense group because it showed a similar model to the profile of ordinary adolescents. The profile type of cluster 2 was named externalization, which can be represented as an externalization group. The results were similar to previous studies, and the profile type of juvenile offenders has higher overall clinical scale than that of ordinary adolescents, indicating behavioral problems. Continued research on juvenile offenders could lead to understanding of youth as well as juvenile offenders.

A Study on the Utilization of Empty Houses in Rural Village - Focused on the Hacheon Village in Gimje City - (농촌마을 빈집의 활용방안에 관한 연구 - 김제 하천마을 중심으로 -)

  • Shim, Yu-Hyeon;Shin, Byeong-Uk;Nam, Hae-Kyeong
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.24 no.1
    • /
    • pp.27-36
    • /
    • 2022
  • Currently the population of rural areas in Korea continue to decline due to low birth rate, aging population, and migration. This phenomenon is accelerated over time. And as a result, there are some declining phenomenon in rural society. And it is same in the residential and basic living conditions of rural villages. The increase ratio of empty houses exacerbates the rural landscape, acts as a cause of crime and bring out various social and economic problems such as worsening settlement conditions and local slums. The study is carried out to prevent this phenomenon by investigating the architectural contents of empty houses in the village, surveyed residents and owners and finally analyzed and synthesized to make a plan to utilize empty houses in the village. This study was conducted from June to December 2021. The conclusions are followings: 1. The empty houses in Korea were 1,511 million in 2020, 8.2% of the total number of houses, whereas those in Jeollabuk-do were 95,412, 12.9% of those of houses, and those in Gimje-city, the subject of this study, were 5,944. It is up to 15.8%. In particular, empty houses in Hacheon village, the site of this study, accounted for the highest ratio, with 25% of the total number of houses. 2. To understand the utilization and improvement of empty houses, surveys and interviews were conducted to residents and owners of Hacheon village in Gimje, and most of the residents submit proposals that empty houses were not desirable in terms of village landscape and safety. The owners don't have intentions of selling or leasing them. They want to remodel them and rent for a specific period. 3. As the physical condition of the empty houses(9empty houses) 6 empty houses of them are good. 4 of them are in poor condition. 4. By synthesizing these contents, nine empty houses in Hacheon village will be remodeled as the space for those of rural start-up young people, smart farm area, community space and rental housings for rural returnees.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.