• Title/Summary/Keyword: Victims of Crime

Search Result 79, Processing Time 0.019 seconds

Current Status of Response to Digital Child Sexual Slavery and Comparative Analysis of Overseas Crime Prediction System Using Artificial Intelligence (디지털 아동 성착취 대응현황과 해외 인공지능 범죄 예측 시스템 비교분석)

  • Kim, Hyejin
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.357-368
    • /
    • 2020
  • This study identifies the aspects and characteristics of 'Digital Sexual Crimes' that changed rapidly in recent years. It has identified the so-called "Telegram sexual harassment and exploitation" incident on the front page. We also want to analyze this and draw up policy suggestions that can help prepare social measures. In the wake of the Telegram sexual exploitation scandal, The National Assembly is quickly proposing related bills. However, the reality is that even a clear concept and definition of "Digital sexual Crimes" have not been made yet. The effective support system for victims is also insufficient. Therefore, this paper examines the definition and concept of child sexual exploitation and harassment. We will look at the features, causes, and conditions. In addition, it will examine the current status of Digital Sexual Crimes distribution and deletion of domestic, foreign platforms. Major foreign countries, including the U. S. A. refer to cases in which big data and artificial intelligence technologies are actively used to protect victims and track perpetrators.

Research on solution for protecting victim privacy of crime deposit with depository

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.209-216
    • /
    • 2020
  • As depository system for negotiation or reimbursement to the victim in criminal case is reflected to consideration for diminishing punishment and hence, it is very important in the process. According to the current law, one needs to fill out victim's personal information such as name, address, and ID number for processing depository. However, if the victim is sexual violence victim, all the personal information is covered up becoming anonymous. Therefore, it becomes difficult for the accused person to get necessary information. Such covering up action is to prevent further second damage that may be caused such as threatening for the negotiation whereas victim has no willingness to forgive the accused. However, even if the accused person regrets his/her crime and make reimbursement to the victim, as they have no personal information on the victim it becomes impossible for them to make the depository. If we apply ESCROW system here it will allow victims to avoid any direct contact with the accused person as well as preventing any privacy disclosure. Also, for the accuse person, they can show how much they regret by making depository within their capability.

Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review

  • Kun Hwang;Chan Yong Park
    • Journal of Trauma and Injury
    • /
    • v.37 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. The mean velocity of a stabbing motion has been reported to range from 5 to 10 m/sec, with knife motions occurring between 0.62 and 1.07 seconds. This speed appears to surpass the defensive capabilities of unarmed, ordinarily trained law enforcement officers. Therefore, it is advisable to maintain a minimum distance of more than an arm's length from an individual visibly armed with a knife. In training for knife defense, particularly in preparation for close-quarter knife attacks, this timing should be kept in mind. Self-inflicted stab wounds exhibited a higher proportion of wounds to the neck and abdomen than assault wounds. Injuries from assault wounds presented a higher Injury Severity Score, but more procedures were performed on self-inflicted stab wounds. Wound characteristics are not different between nonsuicidal self-injury and suicidal self-wrist cutting injuries. Consequently, trauma surgeons cannot determine a patient's suicidal intent based solely on the characteristics of the wound. In Korea, percent of usage of lethal weapon is increasing. In violence as well as murders, the most frequently used weapon is knife. In the crimes using knife, 4.8% of victims are killed. Therefore, the provision of prehospital care by an emergency medical technician is crucial.

A Study on Factors Influencing Telecommunications Fraud : In the Case of Voice Phishing (전기 통신 금융사기에 영향을 미치는 요인에 관한 연구 : 전화 금융사기를 중심으로)

  • Jo, Soohyun;Lee, Wooyoo;Choi, Myeonggil
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.35-49
    • /
    • 2016
  • With the gradual development of IT technology, voice phishing victims are increasing in number. In the past when only voice phone calls were made, personal information or financial information were stolen mainly by a direct phone call, but recently, as smart phones are widely in use, it is evolving into a way such as smishing that leads an access to a site with malicious codes spreading out. Since it is easy to run away after committing a crime, and trace are rarely left in case of voice phishing, it is difficult to find out criminal. In addition, it is most likely that a victim be would be exposed to further damage from another voice phishing. Its technique is growing in kinds and turning more intelligent day by day; Therefore, its victims are increasing in number. Previous researches mainly focused the area of legal studies while the factors exposed to voice phishing have not been made. Therefore, this study has analyzed the motifs in which voice phishing is done to draw out its outcomes as follows. First, a victim comes to trust the criminal by the factors of favorability, rare message, and mutuality. Second, the more sophisticated the technique of a criminal, the more likely a victim is exposed to voice phishing.

A Study on the Improvement of User Identification of Non-Face-to-Face Financial Transactions with Messenger Phishing Case (비대면 금융거래 사용자 확인 개선방안 연구 - 메신저피싱 사례를 중심으로)

  • Eun Bi Kim;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.353-362
    • /
    • 2023
  • Messenger phishing, communications frauds crime, exploits remote control of smartphones and non-face-to-face financial transactions, causing property damage due to money transfers, as well as account opening and loans in the name of victims. Such financial accidents may be careless of victims, but the current messenger phishing criminal method is intelligent and can be seen as digging into loopholes in the non-face-to-face user verification process. In this paper we analyze how messenger phishing uses loopholes in user identification procedures in non-face-to-face financial transactions. Through experiments, it is suggested to improve the non-face-to-face verification process for safer financial transactions.

A Study on the allowed range of viewing and copying right of criminal victim's investigation records (범죄 피해자의 수사기록 열람·등사권의 허용 범위에 관한 연구)

  • NAM, SEON MO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • In this study, I set the allowable range of viewing / copying rights of investigation records on criminal victims and bereaved families in the procedure of investigation. I tried to grasp the contents of the suspect's statement at an early stage and support it in order to cope appropriately Recently, the social consideration of people suffering from crime victims is expanding in fact. The scope of the investigation is set by the lawyer of the suspect in relation to the subordinate statute concerning the investigation and reading of the investigation record. In parallel, it is necessary to apply to the victim's lawyer or bereaved. This is a part that coincides with the purpose of certifying private rights such as browsing of litigation records to the victim and ultimately has a purpose related to the allowable range. Although it is the right to receive the investigation result at each stage, it is not used properly. Especially when distorted investigation progresses, if the suspect is not prosecuted, the victim may be in a state of regret. The important part can be summarized as the question of whether the investigation of the victim's lawyer is allowed to view and access the criminal records. This section has been reviewed with a focus on the current Act and its functional aspects should be emphasized and revised in accordance with the legal environment. These findings will contribute to ensuring victims' rights in the future. It is also used as an important resource in the legislative process, including the revision of the criminal procedure law.

Changes in interpersonal violence and utilization of trauma recovery services at an urban trauma center in the United States during the COVID-19 pandemic: a retrospective, comparative study

  • Kevin Y. Zhu;Kristie J. Sun;Mary A. Breslin;Mark Kalina Jr.;Tyler Moon;Ryan Furdock;Heather A. Vallier
    • Journal of Trauma and Injury
    • /
    • v.37 no.1
    • /
    • pp.60-66
    • /
    • 2024
  • Purpose: This study investigated changes in interpersonal violence and utilization of trauma recovery services during the COVID-19 pandemic. At an urban level I trauma center, trauma recovery services (TRS) provide education, counseling, peer support, and coordination of rehabilitation and recovery to address social and mental health needs. The COVID-19 pandemic prompted considerable changes in hospital services and increases in interpersonal victimization. Methods: A retrospective analysis was conducted between September 6, 2018 and December 20, 2020 for 1,908 victim-of-crime patients, including 574 victims of interpersonal violence. Outcomes included length of stay associated with initial TRS presentation, number of subsequent emergency department visits, number of outpatient appointments, and utilization of specific specialties within the year following the initial traumatic event. Results: Patients were primarily female (59.4%), single (80.1%), non-Hispanic (86.7%), and Black (59.2%). The mean age was 33.0 years, and 247 patients (49.2%) presented due to physical assault, 132 (26.3%) due to gunshot wounds, and 76 (15.1%) due to sexual assault. The perpetrators were primarily partners (27.9%) or strangers (23.3%). During the study period, 266 patients (mean, 14.9 patients per month) presented before the declaration of COVID-19 as a national emergency on March 13, 2020, while 236 patients (mean, 25.9 patients per month) presented afterward, representing a 74.6% increase in victim-of-crime patients treated. Interactions with TRS decreased during the COVID-19 period, with an average of 3.0 interactions per patient before COVID-19 versus 1.9 after emergency declaration (P<0.01). Similarly, reductions in length of stay were noted; the pre-COVID-19 average was 3.6 days, compared to 2.1 days post-COVID-19 (P=0.01). Conclusions: While interpersonal violence increased, TRS interactions decreased during the COVID-19 pandemic, reflecting interruption of services, COVID-19 precautions, and postponement/cancellation of elective visits. Future direction of hospital policy to enable resource and service delivery to this population, despite internal and external challenges, appears warranted.

An Experiential Case Study of Cyber Financial Fraud: Focusing on specific processes and measures (사이버 금융사기의 체험적 사례 연구: 구체적 과정과 대책을 중심으로)

  • Han, Dong-Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.193-200
    • /
    • 2018
  • This study is an experiential case study of cybercrime fraud that combines pharming and voice phishing in April 2017. Research on victims who have actually suffered in the study of crime or disaster is a very useful field in establishing crime prevention measures. This study is significant in that Korea is relatively poor in this kind of research. I got cyber fraud as a consequence of my loss of reasonable judgment due to mental confusion when a companion dog who was raised for 8 years was in a very dangerous situation with cystitis. Fortunately, I received all the damages in a quick report, but the period was eight months. It took too much time to get back all the damages, so I had to suffer another pain. Based on my experience, I suggest damage prevention measures. First, when a certain condition and a certain amount are transferred, the transaction is automatically stopped or a more strict confirmation procedure is added. Secondly, trafficking means to arrest the perpetrator without any harm to the victim is sought. Third, the victims of crime should be promptly reimbursed for damages or a system for lending their living funds to zero or lower interest rate.

A Study on the Actual Situation of Domestic Violence and the Problems of Victims of Domestic Violence and Preventive Measures (가정폭력의 실태 및 피해 가정 문제와 예방대책에 관한 연구)

  • Bae, Na Rae
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.187-193
    • /
    • 2022
  • Domestic violence in our society is where the abuser and the abuser live in the same space. Problems are left unresolved in families where abuse is reproducing. Domestic violence can be viewed as a crime that violates and tramples human rights. They rely solely on family support networks for solutions to domestic violence. The physical, emotional, and psychological pain and wounds that victims of domestic violence must endure are too deep. In order to help victims of domestic violence, case management services that can provide long-term and attentive help in the neighborhood or community are needed. For this, prevention and treatment of domestic violence should be considered together. And the interest and professional role of the community must follow.

A study on the actual conditions of digital sex crime policies in major countries and issues and direction of the sex crime policy in Korea: case studies of the U.S., Australia, Japan, and Germany (해외 주요국 디지털 성범죄 정책 실태 조사를 통해선 본 국내 디지털 성범죄 대응방안의 한계점과 개선과제 고찰 : 미국, 호주, 일본, 독일 사례를 중심으로)

  • Kim, Hyejin
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.85-95
    • /
    • 2020
  • It is a newly defined concept of digital sex crimes as the sex crime pattern in Korea is integrated with digital technology. After examining the current status and response of digital sex crimes in Korea, legal and institutional gaps are identified.It is also aimed at drawing up appropriate responses to domestic situations compared to cases in major foreign countries. This study adopted the mode of literature research.It used related data from government agencies, various statistics and survey data, seminar data organized by the National Assembly office, women's organizations, and research reports. The ultimate goal is to derive the problem situation by analyzing the current system.The results of this study are to discuss digital sex crimes that are being expanded and reproduced by the development of digital media. It also points out that the legal vacuum caused by the law's failure to keep up with the law needs to be continued.Our conclusion is that we should actively accept best practices from abroad. In addition, it is necessary to create a community value in which all members of society become "monitors" in the recognition that they may be perpetrators or victims.