• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.036 seconds

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

Design and Implementation of Birthmark Technique for Unity Application

  • Heewan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.85-93
    • /
    • 2023
  • Software birthmark refers to a unique feature inherent in software that can be extracted from program binaries even in the absence of the original source code of the program. Like human genetic information, the similarity between programs can be calculated numerically, so it can be used to determine whether software is stolen or copied. In this paper, we propose a new birthmark technique for Android applications developed using Unity. The source codes of Unity-based Android applications use C# language, and since the core logic of the program is included in the DLL module, it must be approached in a different way from normal Android applications. In this paper, a Unity birthmark extraction and comparison system was implemented, and reliability and resilience were evaluated. The use of the Unity birthmark technique proposed in this paper is expected to be effective in preventing illegal copy or code theft of the Unity-based Android applications.

The Analysis of Efficient Disk Buffer Management Policies to Develop Undesignated Cultural Heritage Management and Real-time Theft Chase (실시간 비지정 문화재 관리 및 도난 추적 시스템 개발을 위한 효율적인 디스크 버퍼 관리 정책 분석)

  • Jun-Hyeong Choi;Sang-Ho Hwang;SeungMan Chun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1299-1306
    • /
    • 2023
  • In this paper, we present a system for undesignated cultural heritage management and real-time theft chase, which uses flash-based large-capacity storage. The proposed system is composed of 3 parts, such as a cultural management device, a flash-based server, and a monitoring service for managing cultural heritages and chasing thefts using IoT technologies. However flash-based storage needs methods to overcome the limited lifespan. Therefore, in this paper, we present a system, which uses the disk buffer in flash-based storage to overcome the disadvantage, and evaluate the system performance in various environments. In our experiments, LRU policy shows the number of direct writes in the flash-based storage by 10.7% on average compared with CLOCK and FCFS.

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

Psycho-Social Comparison among First Time Offenders and Repeated Offenders on Probation (보호관찰 청소년의 사회 심리적 특성 -초범과 재범군의 비교-)

  • Lee, Hee-jung;Lee, Sung Chil
    • Korean Journal of Child Studies
    • /
    • v.26 no.5
    • /
    • pp.367-377
    • /
    • 2005
  • Semi-structured in-depth interview method were used to test psycho-social comparison among first time offenders and repeated offenders. Data were analyzed by t-test and chi-square. Differences between first time offenders and repeated offenders were that there were more male offenders than female offenders, and violent and theft offenders were more than sex offenders fraud and traffic offenders; early starters were more repeated offenders than late starters; there were some variables such as runway of home, parents' caring attitude, school drop out and maladjustment affecting in repeated offenses; developmental environment of repeated offenders were more negative than first time offenders. Therefore, intervention and prevention program development of good parenting and schooling and forensic counseling focused on optimal developmental environment is needed.

  • PDF

Detection Method of Pickpocket (소매치기 검출 방법)

  • Kim, Hee-Ae;Rhee, Yang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.71-73
    • /
    • 2013
  • 절도죄 중에서 대표적인 소매치기는 대부분 사람이 많이 붐비거나 복잡한 곳에서 발생 하곤 한다. 하지만 현재에는 사람의 발길이 거의 없는 한적한 곳에서 더 많이 발생하고 있다. 본 논문에서는 이렇게 자주 발생하는 소매치기의 수법과 종류에 대해 파악한다. 또한 비디오를 분류하여 현실적으로 법원에 증거자료로 제출하기 위하여 서있는 경우, 앉아있는 경우, 그리고 누워있는 경우로 분류한다.

  • PDF

A Study on the Usage of Hwabangbyeok wall in Traditional Architecture in Joeson Dynasty (조선시대 전통건축에서의 화방벽(火防壁) 사용에 대한 연구)

  • Jo, Sang-Sun
    • Journal of architectural history
    • /
    • v.29 no.3
    • /
    • pp.7-14
    • /
    • 2020
  • It can be meaningful that this study attempted to analyze the use cases and forms based on the literature on the painting walls of the J oseon Dynasty, and attempted basic research to prevent disaster damage using traditional elements. This study summarizes the use of the Hwabangbyeok wall of J oseon Dynasty as follows. First, Hwabangbyeok wall was used from the early J oseon Dynasty and was adopted by palaces and other major state facilities to cope with fire and theft. Second, the Hwabangbyeok Wall was also referred to as the wall below the lower part of the wall, and was constructed with the purpose of preventing disasters from outside. Third, in an analysis of the Daeseongjeon shrine of Hyanggyo, many construction cases were identified mainly in the Gyeonggi area, which is assumed to be based on production and construction conditions along with local climatic factors. Fourth, it can be said that the Hwabangbyeok wall was basically adopted to prevent comprehensive disaster risk reduction in case of external intrusion and fire.

A Study on the Application of the RFID Technology to Libraries (RFID 기술의 도서관 적용 방안 연구)

  • Lee, Jong-Moon
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.157-171
    • /
    • 2007
  • In this study, the usefulness of the RFID technology, which has been recommended to be used in libraries, is reviewed by its technical aspect and the successful methods derived from RFID-applied libraries is presented to other libraries. More precisely, it is advised that checking out or returning books and materials, checking a collection of books, identifying misplaced materials, and theft-proofing materials, which have been previously performed using bar codes or the magnetic tapes, should be automated through RFID additionally the method to apply the technology to library's facilities or devices is proposed.

  • PDF

피싱(Phishing)의 현황과 국내 대응방안 연구

  • 박소영;이병남;박웅
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2004.11a
    • /
    • pp.239-244
    • /
    • 2004
  • 피싱(Phishing)이란 '위장 홈페이지를 만들어 불특정 다수의 이메일 사용자에게 메일을 보내는 수법으로 수신자의 개인정보를 빼내 금융범죄에 악용하는 행위'를 말한다. 기존의 스팸메일 둥과 달리 피싱은 이메일 사용자에게 금융, 신용 피해를 줄 수 있어 개인에게 미치는 피해가 심각한 경우가 발생할 수 있다. 이에 대응하여, 미국에서는 'SB California SB 1386' 등의 법안을 제정하고, 'Coalition on Online Identity Theft' 등의 조직을 결성하는 등 피싱으로 인한 피해 예방 및 대처를 위해 적극적으로 노력하고 있다. 국내에서도 금융기관과 기업에서의 주의 메일 발송, 홈페이지에의 피싱 주의 안내문 게시 둥의 방법으로 대응하고 있으나, 피싱으로 인한 피해를 예방하기에는 미진한 것으로 여겨진다. 이에 본 고에서는 미국을 중심으로 한 피싱에 대한 피해.대응현황과 국내 대응방안에 대해 살펴본다.

  • PDF

Evaluation for cargo tracking systems in railroad transportation

  • Park, Nam-Kyu;Kim, Joo-Young;Choi, Woo-Young
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.3
    • /
    • pp.239-244
    • /
    • 2008
  • Cargo tracking issue on train transportation is challenging area because of long distance haulage, theft, terror attack and customer service. This paper aims at evaluating various cargo tracking systems in terms of cost and technology. The contents of this paper consist of the research trend of cargo tracking system in the railroad transportation and reviewing of technical alternatives in cost and service side. GNSS and RFID are reviewed as location tracking technology, Internet and Satellite technology like INMASAT and Low Earth Orbit are also reviewed as communication infrastructure. This paper selects cost and service factors in two alternatives of GNSS-Satellite and RFID-Internet, among GNSS-Internet, GNSS, Satellite, RFID-Internet, RFID-Satellite and evaluate each alternative in terms of cost and service. In a result, in terms of cost, RFID-Internet type is superior to GNSS-Satellite type, but in service GNSS-Satellite type is preferred to RFID-Internet in point of area coverage and service coverage.