• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.03 seconds

Comparison of Moral Emotions in Juvenile Offenders on Probation with Non-offenders (보호관찰 청소년과 일반 청소년의 도덕적 정서)

  • Lee, Hee-Jung;Lee, Sung Chil
    • Korean Journal of Child Studies
    • /
    • v.26 no.2
    • /
    • pp.107-120
    • /
    • 2005
  • Three types of socio-moral transgression events were used to test the moral emotions and attributions of 30 juvenile offenders on probation with a comparison group of 30 non-offenders. Data were analyzed by chi-square. Differences between juvenile offenders on probation and non-offenders were that juvenile offenders expected victimizers would feel happier and less guilty following such acts of victimization as physical harm, theft, and lying than the comparison group. Non-offenders were more likely than offenders to feel that victims would feel angry and upset. Juvenile offenders gave more variable and less adaptive emotional responses. Offenders provided victimization and emotional distance attributions, but the comparison group provided moral attributions or causal-dependent attributions such as fairness and justice.

  • PDF

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

Korean Firms' Intellectual Property Rights Protection Strategies to Deter Counterfeiting and Brand Piracy in Global Markets (한국기업의 해외시장에서의 위조상품 대응전략에 관한 연구)

  • Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.351-374
    • /
    • 2007
  • Recently, there has been rapid and spectacular increase in world wide counterfeiting and other forms of piracy. According to the World Customs Organization(WCO), counterfeiting accounts for 5 to 7 percent of global merchandise trade, equivalent to lost sales of as much as US$512 billion last year. Also Korean firms' damages arising from the infringement of intellectual property rights in global markets, especially in China market, are increasing. However, the existing studies on the intellectual property rights(IRP) protection have mainly focused on legal protection. Because the law is often not the best defense against theft of intellectual property rights, we must develop more effective defensive weapons for protection of IRP. Given this troublesome trend, the intention of this paper is to discuss strategic and tactical efforts, including legal protection, that can serve as proactive measures to deter counterfeiting and thus to assure the protection of Korean firms' intellectual property rights.

  • PDF

Mini-Batch Ensemble Method on Keystroke Dynamics based User Authentication

  • Ho, Jiacang;Kang, Dae-Ki
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.40-46
    • /
    • 2016
  • The internet allows the information to flow at anywhere in anytime easily. Unfortunately, the network also becomes a great tool for the criminals to operate cybercrimes such as identity theft. To prevent the issue, using a very complex password is not a very encouraging method. Alternatively, keystroke dynamics helps the user to solve the problem. Keystroke dynamics is the information of timing details when a user presses a key or releases a key. A machine can learn a user typing behavior from the information integrate with a proper machine learning algorithm. In this paper, we have proposed mini-batch ensemble (MIBE) method which does the preprocessing on the original dataset and then produces multiple mini batches in the end. The mini batches are then trained by a machine learning algorithm. From the experimental result, we have shown the improvement of the performance for each base algorithm.

Forward Anonymity-Preserving Secure Remote Authentication Scheme

  • Lee, Hanwook;Nam, Junghyun;Kim, Moonseong;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1289-1310
    • /
    • 2016
  • Dynamic ID-based authentication solves the ID-theft problem by changing the ID in each session instead of using a fixed ID while performing authenticated key exchanges between communicating parties. User anonymity is expected to be maintained and the exchanged key kept secret even if one of the long-term keys is compromised in the future. However, in the conventional dynamic ID-based authentication scheme, if the server's long-term key is compromised, user anonymity can be broken or the identities of the users can be traced. In addition, these schemes are vulnerable to replay attacks, in which any adversary who captures the authentication message can retransmit it, and eventually cause the legitimate user to be denied service. This paper proposes a novel dynamic ID-based authentication scheme that preserves forward anonymity as well as forward secrecy and obviates replay attacks.

A Study on countermeasure for privacy in mobile office (모바일 오피스 개인정보 보호 방안에 대한 연구)

  • Park, Yongjoon;Lee, Yunjung
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.178-188
    • /
    • 2015
  • The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.

Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm

  • Sarker, Md. Mostafa Kamal;Song, Moon Kyou
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.661-680
    • /
    • 2016
  • The vehicle license plate recognition (VLPR) system analyzes and monitors the speed of vehicles, theft of vehicles, the violation of traffic rules, illegal parking, etc., on the motorway. The VLPR consists of three major parts: license plate detection (LPD), license plate character segmentation (LPCS), and license plate character recognition (LPCR). This paper presents an efficient method for the LPCS and LPCR of Korean vehicle license plates (LPs). LP tilt adjustment is a very important process in LPCS. Radon transformation is used to correct the tilt adjustment of LP. The global threshold segmentation method is used for segmented LP characters from two different types of Korean LPs, which are a single row LP (SRLP) and double row LP (DRLP). The cross-correlation matching method is used for LPCR. Our experimental results show that the proposed methods for LPCS and LPCR can be easily implemented, and they achieved 99.35% and 99.85% segmentation and recognition accuracy rates, respectively for Korean LPs.

Cryptographically-Generated Virtual Credit Card Number for Secure Card-Not-Present Transactions

  • Park, Chan-Ho;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1864-1876
    • /
    • 2016
  • Card-Not-Present (CNP) transactions taking place remotely over the Internet are becoming more prevalent. Cardholder authentication should be provided to prevent the CNP fraud resulting from the theft of stored credit card numbers. To address the security problems associated with CNP transactions, the use of a virtual card number derived from the transaction details for the payment has been proposed, instead of the real card number. Since all of the virtual card number schemes proposed so far are based on a password shared between the cardholder and card issuer, transaction disputes due to the malicious behavior of one of the parties involved in the transaction cannot be resolved. In this paper, a new virtual card number scheme is proposed, which is associated with the cardholder's public key for signature verification. It provides strong cardholder authentication and non-repudiation of the transaction without deploying a public-key infrastructure, so that the transaction dispute can be easily resolved. The proposed scheme is analyzed in terms of its security and usability, and compared with the previously proposed schemes.

Discourse Characteristics in Healthy Elderly: Effects of Aging, Gender and Educational Level (노년층의 담화 산출 특성: 노화, 성별, 교육정도에 따른 차이)

  • Choi, Hyun-Joo
    • Phonetics and Speech Sciences
    • /
    • v.4 no.2
    • /
    • pp.135-143
    • /
    • 2012
  • Discourse is regarded as an important component of communication assessment, but studies about the discourse characteristics of the elderly are scant. The purpose of this study was to confirm the effects of aging, gender, and educational level on discourse in elderly people with normal cognitive function. Forty normal elderly and forty young people participated in this study. A picture description task (Boston Cookie-Theft picture) was used to examine discourse function. The description task was analyzed for both productivity (total number of sentences, total number of syllables, and syllables per sentence) and semantics (CIU ratio). The results were as follows: 1) Only CIU ratio differed significantly according to age. 2) In the total number of syllables and syllables per sentence, females demonstrate a higher number than males. 3) The CIU ratio differed significantly according to educational level. These results suggest that impairment of communicative function is an aspect of cognitive impairment that can be related to aging. Also, discourse performance in the elderly is associated with their gender and educational level.

Implementation of School Asserts Management Utilizing the 13.56MHz/2.45GHz RFID (13.56MHz/2.45GHz RFID를 활용한 학교 자산 관리 시스템 구현)

  • Ahn, Sung Soo;Joh, Beom Seok;Kim, Ki Yun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.67-73
    • /
    • 2011
  • We developed a RFID system to effective management and monitoring for school assert. In this paper, RFID system implemented a two way which are control to 13.56MHz for in/outbound order and 2.45GHz for positioning tracking and monitoring. We also make up the contents and database utilizing the labview tool in pc. In addition, the developed system can obtain simultaneously the information from several RFID reader at real time so that it is possible to track the position system, the path moving and the status of asserts in the school. Especially, 2.45GHz system has a function to prevent a assert theft. It is observed from the various and practical experiment that the proposed system is useful for assert management and monitoring.