• Title/Summary/Keyword: Security Incidents

Search Result 341, Processing Time 0.03 seconds

Time Series Analysis of the Correlation Between the Number of Drug Crime Arrests and Media Coverage for Enhancing Police Response to Drug Crimes (경찰 대응 능력 강화를 위한 마약 범죄 검거 수와 언론보도량의 시계열 분석)

  • Jeong-Woo Lee;Seungkook Roh
    • Journal of Industrial Convergence
    • /
    • v.21 no.6
    • /
    • pp.13-21
    • /
    • 2023
  • The purpose of this study is to investigate the relationship between the amount of media coverage related to drug crimes and the actual number of drug-related arrests. It aims to determine the implications of this relationship for the formulation of police policies in response to drug crimes. To achieve this, we collected and analyzed 50,355 domestic online media coverage data from 2001 to 2022 and drug crime arrest data compiled by the National Police Agency. The analysis confirmed a significant causal relationship between the amount of online media coverage of drug crimes and the actual number of drug crime arrests. This relationship was found to be influenced by the existence of dominant issues and the relevance of famous incidents. It was determined that media coverage was also influenced by public interest beyond drug crime arrest numbers. Based on these research findings, the police have proposed the need to monitor the amount of crime-related media coverage and enhance security capabilities for crimes that receive public attention in order to gain the trust of the citizens.

Research on digital evidence-based countermeasure depending on the type of small and medium-sized enterprises technology leakage accident (중소기업 기술유출사고 유형에 따른 디지털증거기반 대응방안 연구)

  • Jaeyun Wang;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Small and medium-sized enterprises play a fundamental role in the foundation of our country's industry and economy, and most technological innovations occur in small and medium-sized enterprises rather than large corporations. Technology development and innovation are the only way for small and medium-sized enterprises to survive in a fiercely competitive environment, so they focus on it, but interest and investment in technology protection tend to be stingy. As a result, industrial technology leakage accidents occur frequently, and it is difficult to meet improvement measures. When a leak occurs, digital evidence is required to prove criminal activity, but problems such as digital evidence being damaged or deleted due to management loopholes often occur. Therefore, through this study, we aim to design a digital evidence-based countermeasure depending on the type of technology leak accident. We will classify the types of technology leak incidents that actually occurred and study ways to secure digital evidence in the security environment of small and medium-sized businesses that operate internal information leak prevention solutions.

  • PDF

A Study on the Behavior of an Existing Tunnel and the Safety Implications on its Facilities from a New Tunnel Blasting (신설 터널 발파 시 기존 터널 거동 및 시설물 안전에 관한 연구)

  • Kim, Sung Hoon;Cho, Woncheol
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.2
    • /
    • pp.57-64
    • /
    • 2010
  • In this study, the behavior and safety of an existing tunnel and its facilities are investigated when a new tunnel adjacent to the existing tunnel is blasted. The design of the new tunnel puts priority on stability of the tunnel itself over the safety of the facilities which are installed within the existing tunnel such as jet fans. And thus, a detailed consideration on securing the safety of the existing facilities has been insufficient. An analysis on the types of traffic accidents in the last ten years shows that most incidents were due to the driver's improper response in emergency situations and unexpected obstacles. In consideration of this analysis, the safety of the facilities in the existing tunnel was secured by minimizing the charging amount for each hangfire and changing the excavation method of evacuation communication shelters to the large center hole cut blasting method to reduce blasting vibration. For a more quantitative analysis, measurement devices were installed inside the existing tunnel, at houses adjacent to the new tunnel, near jet fans in the existing tunnel. This enabled real time measurement of displacements of the existing tunnel, adjacent houses, and jet fans without interrupting traffic flow. Therefore, the improvements of charging amount for each hangfire, the blasting method, and the measurement method are suggested in this paper to secure the safety of the facilities in the existing tunnel when a new tunnel, located on a large city and adjacent to an existing tunnel, is designed.

  • PDF

Study on the Realities in Seoul Subway Crimes: Criminal Psychology (서울지하철 범죄 실태에 대한 범죄심리학적 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.233-285
    • /
    • 2004
  • ‘Defined legally as a violation of law' (Sutherland, E. H. Principles of Criminology, Lippincott, Chicago, 1939) Crime within the group is essentially and primarily antisocial in that the criminal who is welfare of his group acts instead against it and breaks the principles of social solidarity not merely by not doing what these principles prescribe, but by doing something exactly opposites. Any program set up to attack crime and delinquent behavior at their sources. A program of his nature needs the constant and comprehensive collaboration of psychiatrists, social works, educations, lawmakers, and public officials, since crime is a social problem and it should be treated as such. Some crime preventives which should be mentioned are as follows, (1) The insurance that every child will be decently born and that his home life be socially and economically adequate; without socially mature parents the chid is handicapped at the start; thus parental education, integrated with the public school system, should be developed now. (2) A more meaningful educational program which would emphasize ideals of citizenship, moral integrity, and respect for the law and the police. (3) A periodic check made for potential delinquents throughout the public schools and treatment provided if possible; and if not, proper segregation in institutions. (4) Careful attention paid to press, movies, and radio so that crime may no longer appear to be glamorous. This can be done by women's clubs, civic bodies, and other educational groups exerting pressure on the movie syndicates and broadcasting companies to free their productions of the tawdry and lurid characteristics of crime and criminals. Aggression associated with the phallic stage of development, The child ordinarily comprehends sexual intercourse as an aggressive and sadistic act on the part of the male, and specifically on the part of the penis. Evidence that the penis is phantasied as a weapon of violence and destruction come from unconscious productions of normal adults. Limerick, for instance, often refer to the penis as square, or too large, etc., so that intercourse is dangerous and painful for the partner, This may wall be a projection of the male's own fear of coitus. A certain portion of the death-instinct always remains within the person; it is called 'primal sadism' and according to Freud is identical with masochism. 'After the chief part of it(the death instinct) has been directed outwards towards objects, there remains as a residuum within the organism the true erotogenic masochism, which on the one hand becomes a component of the libido and on the other still has the subject itself for a object.' Criminalism, compulsive-neurotic frequent repetition of criminal acts in a compulsive manner. Like most symptoms of the compulsive-neurotic, such antisocial act are closely rated to feelings of hostility and aggression, often against the father. Because these acts are symptomatic, they afford only temporary relief and are therefore repeated. One patient with compulsive-neurotic criminalism was apprehended after breaking into hardware store and stealing money. He later confessed to many similar incidents over the preceding two years. At the same time it was apparent that he stole only for the sake of stealing. He did not need the money he thus obtained and had no special plans for using it.

  • PDF

The limits in legislating and the methods for improving the current 'National Guidelines on Anti-Terror Activities' (현행 '국가대테러활동지침'의 문제점과 입법적 개선방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.95-117
    • /
    • 2009
  • Ever since the 9/11 terror attack, all the world has perceived the need and taken actions to make an anti-terror law, however The Republic of Korea has not yet come up with any relevant output. Currently, the Korean government apportions duties to each related government agency and sets up systems for cooperation among them to make preparations against and cope with terror threats, according to The National Guidelines on Anti-Terror Activities (the presidential directive number 47 given on January 21, 1982). However, the directive has many limits and shortcomings in coping with national emergencies. In this situation, this research aims to compare the national anti-terror laws of others countries with Korea's, in order to understand the problems in Korea, i.e., that The National Guidelines on Anti-Terror Activities, which are the only anti-terror regulations in Korea do not clearly describe the concept and range of a terror, that national anti-terror meetings and the anti-terror standing committee have problems with their operation, that the Terrorism Information Integration Center has also its own problems, and that Korea lacks in preparatory actions against terror crimes and there are still problems about investigations into terror incidents. In order to solve these problems for the future, the present author suggests that the purpose of the law on The National Guidelines on Anti-Terror Activities shall be re-established so as to meet the current anti-terror conditions of Korea, the concept of a terror and anti-terror activities shall be clarified, anti-terror organizations shall be unified, the chair of the anti-terror standing committee shall be appointed legally and automatically according to the relevant rule and be given more rights so as to have free access to private information for anti-terror activities and terror-related information, and systems shall be supplemented for reporting terror-involved persons and funds.

  • PDF

Development of an Imaging Based Gang Protection System

  • Grimm, M.;Pelz, M.
    • International Journal of Railway
    • /
    • v.1 no.4
    • /
    • pp.149-156
    • /
    • 2008
  • During maintenance or construction works in or at the tracks of railways, high risks for passengers and railway staff, especially for the workers on the construction site exist. The high risks result out of the movement of rail vehicles, like trains or construction vehicles, which must be faced by using any available technical and operational technologies for securing them against the environment. Therefore, it is necessary to evaluate the level of protection continuously and to identify new and innovative methods and technologies for the protection of the gang (construction worker, machines and material). Especially on construction sites at line sections with two or more parallel tracks but also with single tracks, there are still a lot of incidents and accidents mostly with seriously injured persons or fatalities. These were mainly gang members that breach the railway-loading gage. By using proper warning or protection systems, the avoidance of such accidents must be achieved. The latest developments. in gang protection systems concern on the one hand fixed barriers in the middle between the construction site and the operated track and on the other hand construction vehicles equipped with automatic warning systems. The disadvantage of such protection methods is that the gang can be warned against an approaching train but a monitoring of the gang members cannot be performed. Only one part of a potential dangerous situation will be detected. If the gang members will overhear the acoustic warning signal of the security staff and the workers will not leave the danger zone in the track, the driver of the approaching train had no chance to react to the dangerous situation. An accident is often inevitable. While the detection of acoustic warning signals by the gang members working on a construction site is very difficult, the acoustical planning of an automatic warning system has to be designed for an acoustic short range level of one meter besides the construction vehicle. The decision about the use of today's technical warning system (fixed systems, automatic warning systems, etc.) must be geared to the technical feasibility and the level of safety which is needed. Criteria for decision guidance to block a track should be developed by danger estimation and economical variables. To realize the actual jurisdiction and to minimize the hazards of railway operations by the use of construction vehicles near the tracks further developments are needed. This means, that the warning systems have to be enhanced to systems for protection, which monitor the realization of the warning signal as a precondition for giving a movement authority to a train. This method can protect against accidents caused by predictable wrongdoing. The actual state of the art technique of using a collective warning combined with additional security staff is no longer acceptable. Therefore, the Institute of Transportation System of the German Aerospace Center in Braunschweig (Germany) will develop a gang warning and protection system based upon imaging methods, with optical sensors such as video in visible and invisible ranges, radar, laser, and other. The advantage of such a system based on the possibility to monitor both the gang itself and the railway-loading gauge either of the parallel track or of the same track still in use. By monitoring both situations, the system will be able to generate a warning message for the approaching train, that there are obstacles in the track, so that the train can be stopped to prevent an accident. And also the gang workers will be warned, while they breach their area.

  • PDF

A Study on the Development Direction of Crisis Negotiations of the Police - With Focus on the Police Department Education Development Plan - (경찰 위기협상 발전 방향에 관한 연구 - 경찰 기관의 교육 발전 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.161-189
    • /
    • 2015
  • As the terrorist act inflicted on the American Ambassador to Korea, Mark Lippert on March 5, 2015, the hunting rifle case in Sejong-si in which 3 persons were killed on February 25, and the hunting rifle murder case in Hwaseong-si Namyang-dong on February 27 occurred in succession, there is growing concern that our country is no long safe from firearm violence. Internationally, there is growing concern that our country is no longer safe from international terrorist organizations such as Islamic State (IS), the Sunni Muslims fundamentalists' Islamic militia group, which an 18-year old Korean boy Kim voluntarily joined in January 2015. The police crisis negotiation of our country was established and operated to prepare for the 1988 Olympic Games mainly for counter-terrorism purposes, and due to the characteristics of the prohibition of the use of guns, not a counter-terrorism incident has occurred, so the skepticism about its existence and the development directions are actively being discussed. Our country still prefers the traditional use of force such as SWAT team to resolve crisis case, such as such as murder, terrorism, robbery, and is reinforcing tactical capabilities. However, to perform the primary mission of the police to protect the people's lives and properties, it is necessary to establish the system in which crisis negotiations are possible in the initial stages no matter what incidents may occur by expanding the education for crisis negotiations techniques which are emphasized in the advanced countries such as the United States. In this research, the police department's internal education materials and media are analyzed so that the new police officers who work hardest on the forefront can carry out the roles as basic negotiators of crisis negotiations, and the measures for the development directions of the police crisis negotiations are presented.

  • PDF

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

A Review of Improvements for Providing Safe and Secure Environments for Medical Treatment (안전한 진료환경 구축을 위한 정책 개선과제)

  • Choe, A Reum;Kim, Sung Eun;Baek, Kyoung Hee
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.105-111
    • /
    • 2019
  • On December 31, 2018, an incident occurred where a doctor was attacked and killed by a patient carrying a lethal weapon in the outpatients' clinic of the psychiatric department of a tertiary general hospital. The suspect was diagnosed with bipolar affective disorder (manic depressive disorder) and has been hospitalized and cared for in the psychiatric ward of this hospital. This incident illustrates the necessity of more active cures and therapeutic intervention for mental patients with intellectual developmental disorders who require treatment considering the fact that a radical outcome has been caused by such a patient. However, on the other hand, there is also a need for an approach and analysis from the perspective of crime prevention for all medical departments. The reason for this is that even a tertiary general hospital equipped with the largest human resources, medical devices, facilities, and so forth, is susceptible to violence. As for illegal actions perpetrated against health and medical service personnel in medical institutions, such as verbal abuse, assault, injury, etc. there have neither been understanding shown for the current extent of damage in detail, nor discussions of active institutional improvement related to the seriousness of the act. It can be said that violence in the field of medical treatment is a realm requiring serious discussion and appropriate remedial actions. This is because when such incidents take place, if a patient who is supposed to get treatment from the damaged health care provider is in an urgent situation or on the waiting list of serious cases, he or she could suffer serious damage caused by deprivation of treatment opportunity, or secondary damage might be caused to the patient and/or a guardian who can hardly have an opportunity to take action. Accordingly, in this review, we would like to help create the necessary conditions for both health and medical service personnel and patients/guardians, respectively, to provide and receive medical treatment in a more secure environment. Therefore, objective assessment of the institution and issues relating to this aforementioned incident and general cases of violence occurring in medical institutions, and by suggesting legal and institutional improvements and solutions.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.