• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.033 seconds

A Review of Extended STR Loci and DNA Database

  • Cho, Yoonjung;Lee, Min Ho;Kim, Su Jin;Park, Ji Hwan;Jung, Ju Yeon
    • Biomedical Science Letters
    • /
    • v.28 no.3
    • /
    • pp.157-169
    • /
    • 2022
  • DNA typing is the typical technology in the forensic science and plays a significant role in the personal identification of victims and suspects. Short tandem repeat (STR) is the short tandemly repeated DNA sequence consisting of 2~7 bp DNA units in specific loci. It is disseminated across the human genome and represents polymorphism among individuals. Because polymorphism is a key feature of the application of DNA typing STR analysis, STR analysis becomes the standard technology in forensics. Therefore, the DNA database (DNA-DB) was first introduced with 4 essential STR markers for the application of forensic science; however, the number of STR markers was expanded from 4 to 13 and 13 to 20 later to counteract the continuously increased DNA profile and other needed situations. After applying expanded STR markers to the South Korean DNA-DB system, it positively affected to low copy number analysis that had a high possibility of partial DNA profiles, and especially contributed to the theft cases due to the high portion of touch DNA evidence in the theft case. Furthermore, STR marker expansion not only contributed to the resolution of cold cases but also increased kinship index indicating the potential for improved kinship test accuracy using extended STR markers. Collectively, the expansion of the STR locus was considered to be necessary to keep pace with the continuously increasing DNA profile, and to improve the data integrity of the DNA-DB.

Development of Smart Carrier with Weight Sensing and Alarm System (무게 감지와 경보시스템을 갖춘 스마트 캐리어 개발)

  • Cho, Jun-Su;Kim, Seung-Kyum;Seo, Dong-Seop;Kwak, Se-Young;Kim, Jae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.317-324
    • /
    • 2022
  • In this thesis, in consideration of the functions of general carriers, smart carriers with various convenience functions were studied for supplementation and improvement based on the disadvantages of carriers and inconvenience when using them. Based on the app inventory program, LED and motor locks were installed in carriers through smartphone applications, Bluetooth recognition and control functions that easily control on/off, load cell sensors were installed inside the carriers to detect weight, install Bluetooth and alarms on LCD panels, and prevent theft and loss.

Technique of Information Security for Users against Phishing Attacks (피싱 공격에 대한 사용자 정보보호 방안)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.736-739
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a web site today requires only the server to be hat is considered untrusted.

  • PDF

Development of a LBS-based Bicycle Monitoring System using GPS-CDMA Modem Combined Terminals (GPS-CDMA 모뎀 일체 단말기 및 LBS 기반 자전거 관제 시스템 개발)

  • Lee, Hyung-Bong;Cho, Seung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.41-50
    • /
    • 2012
  • Most of the developed countries and Korea have continued to invest much money in developing low-carbon vehicles such as electric car, methanol car and hydrogen car to replace the conventional fossil fuel vehicles. Government and local governments of each country, however, grope to construct roads for bicycle and public bicycle rental systems because bicycle is the only ultimate and feasible non-pollution transportation. Most of the current bicycle monitoring systems have achieved automation of rental process in bicycle stations, but they can not monitor bicycles in use. This paper develops GPS-CDMA modem combined terminals and implements a LBS-based bicycle monitoring system using them for public bicycle rental system. The monitoring system collects location information from GPS-CDMA modem combined terminals attached on bicycles and presents the moving tracks of bicycles on a GIS map for easy return and redistribution of bicycles. Also, the system helps to prevent from theft and vandalism of bicycles and to recommend the nearest bicycle station.

Analysis of Loss Expectancy on Personal Information leakage using Quantitative Invest Decision Model (투자결정 모델을 활용한 개인정보유출의 기대손실 분석)

  • Kim, Jeong Yeon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.93-106
    • /
    • 2015
  • Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user's convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

A Study on the Construction of Charging System for Small Electric Vehicles Less than 1 [kW] (1[kW] 이하의 소형 전동차량용 충전설비 구축에 관한 연구)

  • Kim, Keunsik
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.93-99
    • /
    • 2019
  • Small electric vehicles, such as electric bicycles or electric kickboards, operate with the power charged in a battery mounted in the vehicle, and some of these users use emergency power sockets installed in apartments or public facilities without getting permission. For this reason, the necessity for a simple method to approve the use of power with instant payment system rises for the building managers and small vehicle users as well. In this paper, we propose a technique to charge batteries for small electric vehicles with less than 1 [kW] through a power supply control device installed on the existing 15 [A]. sockets on the common residential properties or public buildings. It also describes the power user authorization algorithm and how to charge fees for the power used. As a result of this research, this paper shows how the user authentication power supply system with the effect of preventing power theft can be realized by creating an environment in which a battery in a small electric vehicle can be easily charged.

Design of Management System for Registering Agricultural Machine Using Blockchain (블록체인을 활용한 농업기계 등록 관리 시스템의 설계)

  • Son, Yong-Bum;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.18-27
    • /
    • 2019
  • Through the technology of the 4th industrial revolution, agricultural machinery is becoming increasingly intelligent, and the machine is replacing the role of farmer manpower as a whole. However, safety accidents caused by careless use of agricultural machines and theft accidents due to the difficulty of keeping them are increasing every year. Because agricultural machines do not manage the history of events and accidents unlike automobiles, they are often used for crime. There is also no way to cope with the issues if there happens issues on agricultural machines. In this paper, we propose the system based on block chain which can manage the history of the agricultural machinery by registering the chassis number at the same time when purchasing the agricultural machinery. Since this system contains the history of accident and repair information about the owner's agricultural machinery, it is possible to trace back even if a theft occurs. The proposed system also allows buyers to secure transactions by providing reliable data through inquiry of this system when trading in the secondary market in the future.

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.