• Title/Summary/Keyword: Kidnapping

Search Result 25, Processing Time 0.032 seconds

Development and Evaluation of the Educational Program Regarding Life Safety for Children of Low Grade Elementary Schools (초등학교 저학년 아동의 생활안전 교육프로그램 개발 및 효과연구)

  • Doo Kyoung-Ja;Yoon Yong- Hee
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.4 s.218
    • /
    • pp.75-86
    • /
    • 2006
  • The purpose of this study was to develop and evaluate the educational program of life safety for low grade elementary school students. The objectives of the life safety education were established, and the contents and instructions of the educational program were organized according to the needs of the 560 children and their mothers. Both experimental and control groups were evaluated before, immediately after and 3 weeks after the education in terms of knowledge about safety, attitudes and behaviors. The results of this study were as follows: 1. Twelve contents for safety education consisted of safety for electronic games, playing facility, mobile exercise machines, elevator/escalators, traffic and prevention for injury, pricking/cutting, collision/fall/slippery, drowning, burning, electric shock, food toxicity and child missing/sexual harassment/kidnapping. 2. The score of knowledge for safety, attitude, and behavior of the experimental group was improved after the post-tests. Thus, the educational effects were demonstrated to be significant in all evaluation sections.

Development of Educational Content for Nurses to Prevent Safety Accidents of Hospitalized Children: Delphi Approach

  • Lee, Yun Sil;Oh, Won-Oak
    • Child Health Nursing Research
    • /
    • v.25 no.1
    • /
    • pp.74-84
    • /
    • 2019
  • Purpose: The purpose of this study was to develop content for safety education to prevent hospital safety accidents among hospitalized children and to investigate the status of safety education performed by nurses. Methods: First, the Delphi method was used, with 18 experts, to develop educational contents for preventing safety accidents. Second, an exploratory survey was performed of the actual status of safety education for preventing safety accidents among hospitalized children using a questionnaire developed based on the Delphi method. The participants of this study were 159 nurses with at least 6 months of work experience. Results: The educational content developed through the Delphi method for preventing safety accidents among hospitalized children contained seven domains (falls, injury, electric shocks/burns, suffocation/aspiration, poisoning/abuse, kidnapping, medical devices) with 44 topics. The item mean of nurses'perceptions of the importance of child safety education was 4.18, and the actual performance score was 3.72, which was a statistically significant difference (t=11.58, p<.001). Conclusion: These seven comprehensive domains of accident prevention education for hospitalized children are expected to be useful for interventions to support the safety of hospitalized children.

Applying Embedded System Forensics to Car GPS Navigation System Analysis (임베디드 포렌식 기술을 활용한 차량용 GPS 항법 장치 분석)

  • Lee, Yang-Sun;Park, Jong-Hyuk;Kim, Soo-Kyun
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.639-645
    • /
    • 2009
  • It has increased rapidly use of GPS car navigation system in the last few years worldwide. The type of navigation operation is composed of hardware or software. Navigation based on software is stored in exterior storage(e.g. SD card) and executed. One of many navigation software, Mappy, is used most plentifully in Korea. It stores user information such frequently visited place, route and etc. in exterior storage. If it analyzes the dat of navigation, we gain the information such a suspect's movement, route of car. There are important means in a digital forensic perspective because it's available for investigating the crime such kidnapping, murder and etc. This paper provides the necessary information in digital investigation through the analysis of stored data of navigation in a digital forensic perspective.

  • PDF

A Study on Influence of Terror Information on Fear of Terror (테러에 대한 정보가 두려움에 미치는 영향)

  • Kim, Sang-Woon;Cho, Seung-A
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.530-538
    • /
    • 2019
  • The purpose of this study is to examine the influence of terror information on fear of terror. This study examined how indirect delivery of terror information influence on the public's fear toward terror to identify the reason for fear toward terror and to analyze the varying influence based on the information type. Terror is an unjust way where individual or group with certain purpose use various types of violence such as murder, abduction, kidnapping, sniping, and plunder to raise social fear status and accomplish their own will. When terror occurs, many people show fear toward terror and they withdraw from all life activities due to fear. Thus, terror goes beyond creation of fear by using the violence. Instead, terror has a negative influence on people's lives in all social, economic, and cultural fields. This study examined how terror information influencing on indirect terror experience influences on the fear of terror. The result showed that both confirmed information and unconfirmed information influencing on indirect experience had significant influence on the fear of terror. Also, the result showed the unconfirmed terror information had higher influence on the fear compared to the confirmed information.

Two person Interaction Recognition Based on Effective Hybrid Learning

  • Ahmed, Minhaz Uddin;Kim, Yeong Hyeon;Kim, Jin Woo;Bashar, Md Rezaul;Rhee, Phill Kyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.751-770
    • /
    • 2019
  • Action recognition is an essential task in computer vision due to the variety of prospective applications, such as security surveillance, machine learning, and human-computer interaction. The availability of more video data than ever before and the lofty performance of deep convolutional neural networks also make it essential for action recognition in video. Unfortunately, limited crafted video features and the scarcity of benchmark datasets make it challenging to address the multi-person action recognition task in video data. In this work, we propose a deep convolutional neural network-based Effective Hybrid Learning (EHL) framework for two-person interaction classification in video data. Our approach exploits a pre-trained network model (the VGG16 from the University of Oxford Visual Geometry Group) and extends the Faster R-CNN (region-based convolutional neural network a state-of-the-art detector for image classification). We broaden a semi-supervised learning method combined with an active learning method to improve overall performance. Numerous types of two-person interactions exist in the real world, which makes this a challenging task. In our experiment, we consider a limited number of actions, such as hugging, fighting, linking arms, talking, and kidnapping in two environment such simple and complex. We show that our trained model with an active semi-supervised learning architecture gradually improves the performance. In a simple environment using an Intelligent Technology Laboratory (ITLab) dataset from Inha University, performance increased to 95.6% accuracy, and in a complex environment, performance reached 81% accuracy. Our method reduces data-labeling time, compared to supervised learning methods, for the ITLab dataset. We also conduct extensive experiment on Human Action Recognition benchmarks such as UT-Interaction dataset, HMDB51 dataset and obtain better performance than state-of-the-art approaches.

An Efficient Method Defeating Blackmailing Using Blind XTR-DSA Scheme (블라인드 XTR-DSA 스킴을 이용해 블랙메일링을 막는 효율적인 방법)

  • 박혜영;한동국;이동훈;이상진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.125-135
    • /
    • 2002
  • The electronic payment system based on blind signature is susceptible to the blackmailing attack as opposed to keep the lifestyle of users private. In this paper. we suggest an efficient electronic cash system using a blind XTR-DSA scheme, which improves the method of defeating blackmailing in online electronic cash systems of [6,9]. In case of blackmailing, to issue the marked coins we use the blind XTR-DSA scheme at withdrawal. In [6,9], to cheat the blackmailer who takes the marked coins the decryption key of a user had to be transferred to the Bank. But in our proposed method the delivery of the decryption key is not required. Also, in the most serious attack of blackmailing. kidnapping, we can defeat blackmailing with a relatively high probability of 13/18 compared with 1/2 in [9] and 2/3 in [6]. If an optimal extension field of XTR suggested in [7] is used, then we can implement our system more efficiently.

The studies of developing latent fingerprint in general print papers by chemical reaction (화학반응을 이용한 일반 프린트용지의 잠재지문 현출에 관한 연구)

  • Roh, Seung-Chan;Choi, Mi-Jung;Kim, Man-Ki;Lee, Oho-Taick;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.155-163
    • /
    • 2007
  • Porosity paper evidence is encountered in case of forgery, kidnapping, fraud and terrorist activity. The present study was designed to evaluate the effect of three chemical reagents (Ninhydrin, 1,8-diazafluoren-9-one (DFO), Iodine fuming) to the quality of developed latent fingerprints on porosity printing papers and newspaper. In case of printing papers, print quality was better with Iodine fuming method than Ninhydrin and DFO treatment to developing latent fingerprints. Developing latent fingerprint on newspapers was achieved with Iodine fuming processing. The processing of Iodine fuming followed by DFO and by using blue light (orange red filter) exhibited better results with Iodine fuming. Enhancement of latent fingerprint detection image using Digital Imaging System was achieved.

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF

A USN Based Mobile Object Tracking System for the Prevention of Missing Child (미아방지를 위한 USN 기반 보호대상 이동체 위치확인 시스템)

  • Cha, Maeng-Q;Jung, Dae-Kyo;Kim, Yoon-Kee;Chong, Hak-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.453-463
    • /
    • 2008
  • The missing child problem is no more a personal problem. It became a social problem that all parents must consider. To this, this study applies USN/RFID technology integrated with GIS for the prevention of missing child. Although RFID is not designed for location sensing, but now it is regarded as a device to facilitate real time location awareness. Such advantages of RFID can be integrated with 4S(GIS/GPS/LBS/GNSS) achieving much synergy effects. In order to prevent kidnapping and missing child, it is necessary to provide a missing child preventing system using a ubiquitous computing system. Therefore, the missing child preventing system has been developed using high-tech such as RFID, GPS network, CCTV, and mobile communication. The effectiveness of the missing child prevention system can be improved through an accurate location tracking technology. This study propose and test a location sensing system using the active RFID tags. This study verifies technical applied service, and presents a system configuration model. Finally, this paper confirms missing child prevention system utilization possibility.

Analysis of True Nature of Taliban and Terror Threat to Korea (탈레반의 실체와 한국에 대한 테러위협 분석)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.97-107
    • /
    • 2012
  • Our nation, of which the term of dispatching troops is winded up at the end of this year, is facing presidential election time including the nuclear security summit meeting in March, opening of EXPO in May, and the general election. Hence, the possibility to select our nation at the strategy forming public opinion of military withdrawal through Taliban's terror is high. It coincides with public affair strategy of Taliban terror and learning effect by the past cases. If the possibility of terror threat of Taliban along with this is summarized, the period of threat will concentrate on and be heightened in the first half when the nuclear security summit meeting and EXPO open in our nation, and target and method have high possibility of collision terror of bomb carrying vehicle and suicide bomb on national government organizations or American facilities, and etc, and possibility of kidnapping on our people such as oversea tourists, missionaries, and so on. Terror groups joining the criminal act is to use Islam illegal aliens who already acquire base in our nation or entry maneuver of specialized terrorists connected to Al-Qaeda. Pretext of such terror is withdrawal of our military and western allies stationed in Afghanistan. Therefore, publicity terror of Taliban against our people living overseas and security measure of international events such as the world nuclear security summit meeting, Yeosu EXPO, and etc in the first half of this year should be thoroughly prepared, domestic illegal aliens' movement should be comprehended, and measure blocking international terrorists' relating to Taliban infiltration into our nation should be sought for. Also, there is need of early announcement of government's political will on our military stationed in Afghanistan.