• Title/Summary/Keyword: Organized Crime

Search Result 27, Processing Time 0.017 seconds

Contents Analysis of Sexual Abuse Recognized by Elementary School Students (성폭력에 대한 초등학생의 인식 내용분석)

  • Kim, Shin-Jeong;Park, Sun-Jung;Kim, Sung-Hee;Kang, Kyung-Ah
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.19 no.4
    • /
    • pp.518-530
    • /
    • 2013
  • Purpose: Purpose: The purpose of this study was to provide basic data to develop sexual abuse prevention educational programs for elementary school students. Method: Ninety three third, fourth, fifth, and sixth grade elementary school students were interviewed for content analysis on sexual abuse. Results: The content recognized by elementary school students about sexual abuse was as follows: 1) The concepts of sexual abuse were 'compulsory contact', 'harassment', 'school violence', 'pornography', 'unpleasant sexual behavior' 'crime', and 'don't know'. 2) The causes of sexual abuse were 'intolerance of impulse', 'play', 'bullying', 'financial needs', 'home education and the environment', 'negligence of the victim', and 'don't know'. 3) The methods how to prevent and deal with sexual abuse were 'sexual education', 'avoidance of danger', 'protection', 'self-assertion', 'treat with kindness', 'strengthening of penalties', 'asking for help and notification', 'report', 'treatment and counselling', 'escaping', and 'don't know' 4) Educational needs for prevention of sexual abuse were 'more detailed sexual abuse prevention education', 'how to recognize sexual abuse', 'how to protect oneself', 'interpersonal relationship', 'practical education', and 'none'. Conclusion: These results suggest that based on elementary school students' recognition of sexual abuse, a sexual abuse prevention educational program and content should be organized.

Impurity profiling and chemometric analysis of methamphetamine seizures in Korea

  • Shin, Dong Won;Ko, Beom Jun;Cheong, Jae Chul;Lee, Wonho;Kim, Suhkmann;Kim, Jin Young
    • Analytical Science and Technology
    • /
    • v.33 no.2
    • /
    • pp.98-107
    • /
    • 2020
  • Methamphetamine (MA) is currently the most abused illicit drug in Korea. MA is produced by chemical synthesis, and the final target drug that is produced contains small amounts of the precursor chemicals, intermediates, and by-products. To identify and quantify these trace compounds in MA seizures, a practical and feasible approach for conducting chromatographic fingerprinting with a suite of traditional chemometric methods and recently introduced machine learning approaches was examined. This was achieved using gas chromatography (GC) coupled with a flame ionization detector (FID) and mass spectrometry (MS). Following appropriate examination of all the peaks in 71 samples, 166 impurities were selected as the characteristic components. Unsupervised (principal component analysis (PCA), hierarchical cluster analysis (HCA), and K-means clustering) and supervised (partial least squares-discriminant analysis (PLS-DA), orthogonal partial least squares-discriminant analysis (OPLS-DA), support vector machines (SVM), and deep neural network (DNN) with Keras) chemometric techniques were employed for classifying the 71 MA seizures. The results of the PCA, HCA, K-means clustering, PLS-DA, OPLS-DA, SVM, and DNN methods for quality evaluation were in good agreement. However, the tested MA seizures possessed distinct features, such as chirality, cutting agents, and boiling points. The study indicated that the established qualitative and semi-quantitative methods will be practical and useful analytical tools for characterizing trace compounds in illicit MA seizures. Moreover, they will provide a statistical basis for identifying the synthesis route, sources of supply, trafficking routes, and connections between seizures, which will support drug law enforcement agencies in their effort to eliminate organized MA crime.

Estimating the Socioeconomic Costs of Child Poverty (아동 빈곤의 사회경제적 비용 추계)

  • Kim, Soo Jung;Chung, Ick-Joong
    • Korean Journal of Social Welfare
    • /
    • v.69 no.3
    • /
    • pp.9-33
    • /
    • 2017
  • This study estimated the socioeconomic costs of child poverty. Based on previous studies, the present study organized component categories for direct and indirect costs of child poverty, and estimated the cost of each category in 2015 through the collection of existing data and Delphi survey techniques among experts. The total socioeconomic costs of child poverty were compared to Korea's GDP. The results of this study were as follows. First, the socioeconomic costs of child poverty in Korea in 2015 ranged from 55 trillion KW(3.5% of GDP) to 99 trillion KW(6.5% of GDP). Second, the indirect socioeconomic costs of child poverty are much higher than the direct costs. Third, among the total cost categories, costs related to productivity loss and unemployment accounted for the largest portion of both the socioeconomic costs based upon absolute poverty and relative poverty. Crime costs are the second largest. Based on these results, we discussed the importance of early intervention for children in poverty; implementation of two-generation program that intervenes simultaneously with parents and children; and long-term, continuous and integrated intervention for high-risk groups such as poor children.

  • PDF

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

The assessment and political subject of Revised Security Industry Law (개정 경비업법의 평가와 정책과제)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.349-386
    • /
    • 2013
  • This research analyzes and evaluates The Korean Security Industry Law(TKSIL) putting the regulation of the present government about the private security industry. It nowadays becomes the important axis of the police services offered in the aspect of 'the national life safety' in connection with 'the materialization of society which is safe from the crime'. TKSIL is one of the national administration strategies which Park Gun-hye government aims on supervision policy. After seeking out the core values of the private security industrial policy which sets up in order to approach the national life safety which Park Gun-hye government aims, we make some assessments of this revised security industry law systematically. Particularly all keynote of policy about the private security of the police tried to be confirmed and the desirable direction of policy tries to be presented as to the security industry law application and real operation. In the site of organized civil complaint, the revised security industry law was revised as the direction which intensifies the administrative regulation as to the partial regulation such as it established the reason of the introduction of the arrangement license system. And grounds for disqualification of security instructor and guard, and rules of punishment is intensified order to intercept previously illegal and violent act of the security company etc. However it has the feature that it accomplishes 'the law principle(principle of statute)' the substantial portion through the effort of them changing a lot the content for the form of the law when being the clauses of the fundamental human rights limit, although it has been prescribed in "the security industry law enforcement ordinance" or "the security industry law enforced regulation". The security industry law revised this time brought from the change of the sharp policy through the revision of 17 clauses or new establishment. It can divide into 4 categorizes. (1) strictness of punishment in the site of organized civil complaint (2) Intensification of throwing out for the violation person in the private security business market time-limitedly (3) Intensification of the legal guide supervision power of police (4) upstream of the capital, name tag attachment under compulsion and the limit about other equipment use etc. Essentially "the security industry law" cannot help regulating the national interference of the private security and regulation with this content. However as to this interference and regulation, the limit has to be possible within reasonable range. As the history proved, excessive regulation by the country is not only due to bring the distortion of the security system of nation but also provoke national social cost. It can't be disregards ever that it premises the harmony which appropriate as well as reasonable in the socio-economic dimension for drawing the best combination that all things which get the compulsory education, it limits the person providing the private security service to the corporation, or it limits to the certificate of qualification holder are the ultimate for 'the safety of the national life'.

  • PDF

Development and Effectiveness Analysis of Workshop Program for Child Safety Map Making (아동안전지도 제작을 위한 워크숍 프로그램 개발 및 효과분석)

  • Son, Dong-Pil;Lee, Kyung-Hwan;Chae, Han-Hee
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.7
    • /
    • pp.109-117
    • /
    • 2019
  • Recently, child safety map making education has attracted attention as a way to reduce crimes against children. In Korea, the Ministry of Gender Equality and Family organized a child safety map making education program in 2011. The program's manual was revised in 2013 and the Ministry implemented it as a project to promote the rights of women and children. Child safety map making education aims to raise a child's understanding of their neighborhood, to have voluntary control and normal consciousness as a local inhabitant, to be aware of wrong behavior and crime, and to be part of creating a safe urban environment. However, when compared to educational programs in other major developed countries, the child safety map making education program in Korea currently does not improve a child's awareness of their surroundings. In this workshop study, we proposed and ran a new program to improve children's awareness of their environment based on the active participation of children in the existing safety map educational program. The workshop was held for 4 weeks for 48 students from 5th and 6th grade at Osan Daeho Elementary School. We analyzed this new program's effects with the following results. First, an analysis of the effects of the program on children's recognition of safe and dangerous spaces revealed that their understanding of these spaces increased by 30.4% after the workshop. The safety-related factor in the mind map key concept increased from 0.94 to 4.94, indicating that the children's perception of neighborhood risk and safety factors improved. Second, the analysis of the effects of the program on the children's coping ability in dangerous situations showed that their understanding of how to deal with dangerous situations increased by 11.3%. The children's understanding of facilities they could ask for help, such as police boxes and child safety guard houses, improved by 17.9%. Third, analysis of the effects of child safety map making education on children's understanding of their neighborhood, their perception of responsibility in the neighborhood, and their neighborhood attachment showed that these levels of children's understanding of the neighborhood improved by 6.0% after the workshop.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.