• Title/Summary/Keyword: Security law

Search Result 899, Processing Time 0.024 seconds

A Study on History of Criminal Policy in Korea (한국(韓國)의 형사정책(刑事政策)에 관한 역사적(歷事的) 고찰(考察))

  • Kim, Hyeong-Cheong
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.1-46
    • /
    • 2003
  • During the ancient times, there was no separative judicial system and administrative , legislative and judiciary functions were ultimately concentrated in the all-powerful monarch. And the three states developed state organization , adopting hieratical structures and placing at the pinnacle . State Codes were promulgated to initiate a legal system to rule the people, these codes instituted under influence of China codes. The people tradition sees crime control as the preservation of the authority of hereditary rulers. In the period of the Koryeo dynasty, government accepted a serious of detailed penal code from Tang dynasty . Legal response to crime stressed preservation of the dynasty rather than making citizen behave according to certain rules. In the period of Early Joseon , the compilation of Grand Code for state administration was initiated, the Kyeongkuk Taejeon ,became comer stone of the dynastic administration and provided the monarchial system with a sort of constitutional law in written form. This national code was in portant means of criminal policy at that time, Late Joseon , the impact of Western culture entering through China gave further impetus to pragmatic studies which called for socio-economic reforms and readjustment. Approach to criminal justice policy emphasized more equitable operation of the criminal justice system ,rehabilitation and crime control. Korea-Japanese Treaty concluded on 22 August ,1910 and proclaim a week later ,Japan gave the coup de grace to the Korea Empire and changed the office of the Resident - General into the Government - General . Thus korean criminal policy were lost during a dark ages ,which lasted for 36 years after fall of Joseon Dynasty (the colnial period,1910${\sim}$1945). After 1945 Korea's liberation from Japanese colonial rule, the occupation of devided Korea by the United States and Soviet Union frustrated the efforts of Koreans to establish an independent government, and the transplantation of two conflicting political ideologies to south and the north of the 38th parallel further intensified the national split. U.S. military government office occupied the south of the 38 the parallel and placed emphasis on democracy of criminal policy. ln 1948, the U.S. military government handed over to the ROK government its administrative authority.

  • PDF

A study on 112 crime call system (112 범죄신고체제에 관한 연구)

  • Hwang, Hyun Rak
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.23-32
    • /
    • 2012
  • The police is responsible for protecting nation's property and life. Protecting nation from crime among the core duties is the most important activity of the police. But the big problem on reported crime system of the police was founded in the recent Suwon incident. Unfortunately, the unprofessional response made a toll of human sacrifice. Taking this opportunity, we need to consider closely the problems of the reported crime and system of the police and the solutions on the problems. This study analyzes the reported crime system of the police from the law and institutional and try to seek the solutions. This study searches the management status of the police system and arranges the problems in legal and institutional terms. And then, it arranges the solutions on the problems.

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

A Study on the Civil Resource Utilization of Military Defense (국방 분야의 민간자원 활용에 관한 연구)

  • Park, Kyun Yong;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.3-10
    • /
    • 2016
  • This study is to actively respond to changes in terms of age, it was to find a possible way to realize the effective application of research to expand the civilian use of resources in the defense sector. Utilization of civil resources were first introduced by the previous government institutions to be applied to the military, our country, the use of private resources began with the 1948 case of a consignment of rubbish. In particular, in the process of overcoming the economic crisis IMF 1990s the government increased its advantage in the public service sector while introducing elements of civil to the public sector. Meanwhile, the Pentagon was promoting policies that foster and promote the civil sector in defense of "defense reform law" in terms of the advancement of military operations. The results of the work carried establish schemes for the civil use of resources, which can be protected by legal and institutional supplement, it is determined that you need a dedicated organization for the construction of projects.

The Guarantee of Criminal Victim's Information Rights (범죄피해자의 정보권보장을 위한 방안)

  • Yang, Kyung Kyoo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2013
  • The most important thing in the trial reveal the truth regardess of civil trial or criminal trial. The criminal procedure should be amended to guarantee victims the right to attend court hearings, to receive information about the progress of their case. But the new Criminal Procedure Law 2007 stipulated merely reading right of investigation records after prosecution while reading and printing rights prior to prosecution were not legislated. All sections of the criminal justice process must ensure that the process of dealing with the offender should not increase the distress or add to the problems of victims of crime in secondary victimisation. Reading and printing rights of prior to prosecution should be stipulated at earliest to protect the criminal victims and to prevent the secondary victimisation, The purpose of this study is to practically protect the right of the victims on the criminal procedures.

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.

Construction of Financial Networks based on Virtual Private Networks (가상사설통신망 기반 금융전산망 구축 방안)

  • Seo, Moon-Seog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.41-48
    • /
    • 2009
  • As enactment and enforcement of capital markets integration law, investment banks are going to be appeared in our financial market and be able to provide payment services. To provide these kinds of services, investment banks need to be participated in the financial network. As the financial network enormously affect the economy, the operation of the network will require a variety of risk managements. In this paper we define operational risk management criteria for the financial network such as security, in-time response, economical efficiency and stability to be required for the healthy economy and propose the configuration of the financial network system based on virtual private networks for investment banks to provide payment services. Finally we analyze that the proposed VPN configuration for financial networks has high security and in-time response with the cost and operation effective.

Introduction of the FSO Through the Examination of Russia's Federal Law (러시아 연방법령 고찰을 통한 경호총국 소개)

  • Kim, Chang-Ho;Oh, Jae-Hwan;Park, Jun-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.286-293
    • /
    • 2010
  • The organization and position of FSO was systematically established under the Presidential Decree No. 1013 on 7 August 2004. Furthermore, the FSO has established a signal department, an intelligence department and an academy to enhance intelligence an training capabilities. The FSO has been striving to unveil itself from a clandestine agency into a pivotal organization through the use of media and its website. It is in part that FSO has tried to deepen the understanding between PSS through personnel exchange in 2004~2005 Therefore, this study will examine the history, organization and legal position focusing on the related laws of FSO, an organization trying to adjust to the global change, and study whether this model may be applied for the development of public security in Korea.

The Genealogy of Rebellious Communication and Twitter A Discourse Analysis of the Park Jung-geun Case ('불온 통신'의 계보와 '트위터' 박정근 사건에 대한 담론 분석을 중심으로)

  • Hong, Namhee
    • Korean journal of communication and information
    • /
    • v.81
    • /
    • pp.329-362
    • /
    • 2017
  • This study starts from the awareness that 'rebellious communication' is still being regulated in various ways even though 'rebellious communication' was declared unconstitutional in a decision by the Constitutional Court in 2002. The meaning of 'rebellious' has been amplified and transformed at various points through the censorship systems established during the Japanese colonial era, the US military period, and the regime of Park Jung-hee. In particular, 'rebellious communication' is regulated to protect 'national security' and 'social customs' from the perspective of power. This study analyzed discourses containing judgement about the Park Jung-geun case and the violation of the National Security Law using retweet accounts or posts related to North Korea. This study explores the genealogy of 'rebellious communication' based on its relationship to the characteristics of Twitter and specific individuals.

  • PDF

A Study on The Measures of Monetary Rewards When Providing The Evidences (범죄증거자료 제보시 범죄신고보상금 지급방안에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.43-51
    • /
    • 2015
  • Many of crimes are solved by the report of people. Therefore, countries pay compensation to crime reporter. However, the current system of compensation is focused on the report of criminal fact and criminals arrest, so that there is no compensation on the providing evidence. On the other hand, since the current judicial system adopted the principle of trial by evidence, all the facts are made by the evidence. But it is impossible to obtain all the evidence only by law enforcement agencies. Therefore, it is necessary for people to report the evidence positively. So it is necessary to positively take advantages of smart phones, vehicle black boxes and cctvs. Various incentives such as compensation would be needed to require the evidence of smartphone or black box, cctv. In order to strengthen evidence report, it will be needed the legislation of crime report compensation, smartphone apps development including the provision of various incentives.