• Title/Summary/Keyword: Victim Protection

Search Result 71, Processing Time 0.023 seconds

Effect of Childhood Abuse Experience on Gender Role Attitude : Focusing on the moderating effect of social support

  • Lee, Ji-woo;Choe, Eun-hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.227-235
    • /
    • 2021
  • The purpose of this study is to investigate the characteristics of childhood abuse experience, analyze factors affecting gender role attitudes, find out the moderating effect of social support, and suggest preventive measures and alternatives for childhood abuse experiences. proceeded. This study was conducted by the Ministry of Gender Equality and Family, through a domestic violence survey conducted every three years in accordance with the 「Act on the Prevention of Domestic Violence and Victim Protection, etc.」 Analysis was performed on 4,546 people and 4,514 men. As a result, it was found that childhood abuse experience had a negative (-) effect on gender role attitudes, and the analysis of the moderating effect of social support also showed a negative (-) effect. In the future, it is necessary to strengthen awareness of childhood abuse prevention and child protection from the beginning of life, and it is suggested that the level of children's parental education and social support and sufficient measures be prepared for future research.

A Study on the Preventive Measures of Criminal Behaviors and Criminal Damages of North Korean Defectors (북한이탈주민의 범죄행위 및 범죄피해에 대한 효과적인 예방대책)

  • Lim, Chang-Ho
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.217-246
    • /
    • 2016
  • Most of the North Korean defectors are the socially disadvantaged, and formed the lowest class in South Korean society. Their main objectives are to achieve economic wealth. In this process, North Korean defectors have often committed the crime or have been criminal victims. The purpose of this study was to propose the effective preventive measures after analyzing the actual situation of North Korean defectors in criminal behaviors and criminal damages. This research has studied of the literature on the criminal behavior and the criminal damage by North Korean defectors, utilized the relevant statistical data, cited the news for the relevant cases, and proposed the effective preventive measures of criminal behaviors and criminal damages of North Korean defectors by doing in-depth interviews with personal protection officer First, in order to prevent criminal activity by North Korean defectors, we should uplift the identity as the members of Korean society, systemize the initial adapt education, enlarge the employment protection and the resettlement helper system, manage North Korean defectors according to adaptive type, develop the network, establish the management department for the defectors, strengthen the training of prison inmates, and strengthen the management of unprotected people. Next, in order to prevent the criminal damages of North Korean refugees, we should manage vulnerable North Korean defectors effectively, maintain the liaison between the personal protection officer and North Korean defector, arrange the personal safety measures in advance when traveling abroad, enhance the legal education for usual living in Korean society, and perform the re-education for the female socialization.

  • PDF

A Study on Irresistible Medical Accidents Victims Relief System in the Perspective of Public Law (불가항력적 의료사고에 대한 국가보상의 공법적 검토)

  • Lee, Ho-Yong
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.59-84
    • /
    • 2010
  • Medical practice is characterized by various physiological response and uncapacity of prediction, therefore when medical accident occur it's hard to prove medical professionals' mistake. Though medical accident by medical professionals' mistake will be compensated anyhow, about irresistible medical accidents, no one should be not bound to compensate, victims get into very difficult situation. So, the nation don't negligent irresistible medical accidents but compensate anyway. As in the past, to the legal principle's constitution of irresistible medical accidents, theory of liability without fault was adapted, and it was said this theory was illogical in theory of liability with fault. But the subject of compensation to irresistible medical accidents is nation, nation don't participate in medical treatment therefore there is no room to occur mistake. And it is not reasonable to regard medical agency as a truster of public service, to cast to it responsibility of medical accidents. The problem of compensation to irresistible medical accidents is understood under the theory of social compensation. Social compensation is consisted of compensation to sacrifice and contribution to nation and society and compensation to sacrifice revealed under danger, the compensation to irresistible medical accidents belongs to the latter. This is near to concept of relief, is applied to national compensation system supplementarily, and compensation have no option but to compensate minimum. And there are not relation between national compensation system of irresistible medical accidents and proof liability transposition and theory of liability with out fault, merely in side of sharing responsibility burden between medical treater and victim, it is reasonable to discuss transportation of proof liability and compulsive liability insurance together.

  • PDF

The Guarantee of Criminal Victim's Information Rights (범죄피해자의 정보권보장을 위한 방안)

  • Yang, Kyung Kyoo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2013
  • The most important thing in the trial reveal the truth regardess of civil trial or criminal trial. The criminal procedure should be amended to guarantee victims the right to attend court hearings, to receive information about the progress of their case. But the new Criminal Procedure Law 2007 stipulated merely reading right of investigation records after prosecution while reading and printing rights prior to prosecution were not legislated. All sections of the criminal justice process must ensure that the process of dealing with the offender should not increase the distress or add to the problems of victims of crime in secondary victimisation. Reading and printing rights of prior to prosecution should be stipulated at earliest to protect the criminal victims and to prevent the secondary victimisation, The purpose of this study is to practically protect the right of the victims on the criminal procedures.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.

Legal System Reasearch Relating to Retaliatory Crime (보복범죄 관련 법제연구)

  • Kang, Maeng-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.179-187
    • /
    • 2015
  • Social unrest from retaliatory crimes is increasingly becoming problematic. Recently, there was an accident involving a suspect who went to a hospital and committed acts of retaliatory violence 11 times. This person's reasoning was that he was imprisoned due to the hospital's reporting to the police. He was consequently arrested in Boeun Choongbook on December 27th 2014. Accidents like this one take place frequently around our surroundings. There are regulations and systems in place. Nevertheless, similar cases that continue to take place makes us wonder if criminal judicial systems work well. Lukewarm responses to retaliatory crimes is not only threatening social security, but also placing fears in the minds of ordinary citizens. If retaliatory crimes take place, most citizens become apprehensive about criminal judicial activities of the police and mistrust for criminal judicial system. This at times discourages people from reporting incidents and could eventually increase crime rate and cause various social problems. Even though there are legal and systemic control measures, retaliatory crime is an increasing trend. This study is going to examine tendencies of internal retaliatory crimes and discuss legal-systemical responses.

Contents Analysis of Sexual Abuse Recognized by Elementary School Students (성폭력에 대한 초등학생의 인식 내용분석)

  • Kim, Shin-Jeong;Park, Sun-Jung;Kim, Sung-Hee;Kang, Kyung-Ah
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.19 no.4
    • /
    • pp.518-530
    • /
    • 2013
  • Purpose: Purpose: The purpose of this study was to provide basic data to develop sexual abuse prevention educational programs for elementary school students. Method: Ninety three third, fourth, fifth, and sixth grade elementary school students were interviewed for content analysis on sexual abuse. Results: The content recognized by elementary school students about sexual abuse was as follows: 1) The concepts of sexual abuse were 'compulsory contact', 'harassment', 'school violence', 'pornography', 'unpleasant sexual behavior' 'crime', and 'don't know'. 2) The causes of sexual abuse were 'intolerance of impulse', 'play', 'bullying', 'financial needs', 'home education and the environment', 'negligence of the victim', and 'don't know'. 3) The methods how to prevent and deal with sexual abuse were 'sexual education', 'avoidance of danger', 'protection', 'self-assertion', 'treat with kindness', 'strengthening of penalties', 'asking for help and notification', 'report', 'treatment and counselling', 'escaping', and 'don't know' 4) Educational needs for prevention of sexual abuse were 'more detailed sexual abuse prevention education', 'how to recognize sexual abuse', 'how to protect oneself', 'interpersonal relationship', 'practical education', and 'none'. Conclusion: These results suggest that based on elementary school students' recognition of sexual abuse, a sexual abuse prevention educational program and content should be organized.

Interference Influence Analysis on the Interoperability in the Combined Military Communication Systems (통합 군 통신 시스템에서 상호운용으로 인한 간섭 영향 분석)

  • Kim, Tae-Woo;Kim, Jung;Kwag, Young-Kil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.3
    • /
    • pp.365-371
    • /
    • 2014
  • It is essential for the combined military weapon system to be equipped with interoperability for the efficient combat operation in the modern warfare environment. Since most of modern military systems utilize the electromagnetic wave for the radio communication in the network-centric warfare system, they can be vulnerable to the mutual interference among the adjacent combined military systems. In this paper, the typical radio communication systems are modeled with the modulation types of both spread and non-spread spectrum system. The various interference signals were generated for the simulation of the mutual interference influence from the adjacent radar and communication systems. The simulation results show that the detection performance of the victim communication receiver is seriously affected by the various interferences such as the types of modulation and the ratio of the overlapping bandwidth of the adjacent interferers. This result will be useful for defining the criteria of the interference protection in the combined military system for the interoperability in the future.

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF