• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.028 seconds

Study on the Realities in Seoul Subway Crimes: Criminal Psychology (서울지하철 범죄 실태에 대한 범죄심리학적 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.233-285
    • /
    • 2004
  • ‘Defined legally as a violation of law' (Sutherland, E. H. Principles of Criminology, Lippincott, Chicago, 1939) Crime within the group is essentially and primarily antisocial in that the criminal who is welfare of his group acts instead against it and breaks the principles of social solidarity not merely by not doing what these principles prescribe, but by doing something exactly opposites. Any program set up to attack crime and delinquent behavior at their sources. A program of his nature needs the constant and comprehensive collaboration of psychiatrists, social works, educations, lawmakers, and public officials, since crime is a social problem and it should be treated as such. Some crime preventives which should be mentioned are as follows, (1) The insurance that every child will be decently born and that his home life be socially and economically adequate; without socially mature parents the chid is handicapped at the start; thus parental education, integrated with the public school system, should be developed now. (2) A more meaningful educational program which would emphasize ideals of citizenship, moral integrity, and respect for the law and the police. (3) A periodic check made for potential delinquents throughout the public schools and treatment provided if possible; and if not, proper segregation in institutions. (4) Careful attention paid to press, movies, and radio so that crime may no longer appear to be glamorous. This can be done by women's clubs, civic bodies, and other educational groups exerting pressure on the movie syndicates and broadcasting companies to free their productions of the tawdry and lurid characteristics of crime and criminals. Aggression associated with the phallic stage of development, The child ordinarily comprehends sexual intercourse as an aggressive and sadistic act on the part of the male, and specifically on the part of the penis. Evidence that the penis is phantasied as a weapon of violence and destruction come from unconscious productions of normal adults. Limerick, for instance, often refer to the penis as square, or too large, etc., so that intercourse is dangerous and painful for the partner, This may wall be a projection of the male's own fear of coitus. A certain portion of the death-instinct always remains within the person; it is called 'primal sadism' and according to Freud is identical with masochism. 'After the chief part of it(the death instinct) has been directed outwards towards objects, there remains as a residuum within the organism the true erotogenic masochism, which on the one hand becomes a component of the libido and on the other still has the subject itself for a object.' Criminalism, compulsive-neurotic frequent repetition of criminal acts in a compulsive manner. Like most symptoms of the compulsive-neurotic, such antisocial act are closely rated to feelings of hostility and aggression, often against the father. Because these acts are symptomatic, they afford only temporary relief and are therefore repeated. One patient with compulsive-neurotic criminalism was apprehended after breaking into hardware store and stealing money. He later confessed to many similar incidents over the preceding two years. At the same time it was apparent that he stole only for the sake of stealing. He did not need the money he thus obtained and had no special plans for using it.

  • PDF

Growth of $ZnGa_2O_4:Mn^{2+}$ Thin Film Phosphors by RF Magnetron Sputtering (박막 형광체 $ZnGa_2O_4:Mn^{2+}$의 RF Magnetron Sputtering법을 이용한 생장)

  • Kim J.S.;Lee S.H.;Park J.H.;Park H.W.;Choi J.C.;Park H.L.
    • Journal of the Korean Vacuum Society
    • /
    • v.15 no.4
    • /
    • pp.404-409
    • /
    • 2006
  • Thin-film $ZnGa_2O_4 : Mn^{2+}$ phosphors of spinel structure were grown on quartz substrate by RF magnetron sputtering method at room temperature. As an increase of post-annealing temperatures, crystallinity, surface roughness and stoichiometry of thin films were varied. At the post-annealing temperatures of $500^{\circ}C$ and $600^{\circ}C$, the luminescence intensity was poor due to the poor crystallinity. The smallest surface roughness was observed at the sample post-annealed at $700^{\circ}C$ leading to low external extraction efficiency, and poor luminescence intensity. The highest luminescence intensity was shown at the sample post-annealed at $800^{\circ}C$. It was because both the surface roughness and crystallnity were optimized. On the other hand, at $900^{\circ}C$, the luminescence intensity was poor due to the violation of stoichiometry.

Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance (서비스의 유용성과 프라이버시 염려도가 개인화 된 서비스 수용성에 미치는 영향에 관한 연구)

  • Lee, Zoon-Ky;Choi, Hee-Jai;Choi, Seon-Ah
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.37-51
    • /
    • 2007
  • As the highly improved Internet and information technology has led to the diversification of users' demands, personalization service attract lots of attention as a means to meet highly diversified demand of users. However, personalization service costs a lot. Also concerns over a possible violation of privacy have been raised since the service uses technology to find out the users' profiles. This research studies the advantages individuals acquire from personalization service and how privacy concern influences service acceptance. Research on related documents and information gathering from e-commerce sites derived six representative types of service. Questionnaires were utilized to research privacy concern according to services, service usefulness, and service acceptance. As expected, privacy concern has a negative relation to acceptance while service usefulness has a positive relation to it, thereby resulting in an offset between two variables. Moreover, they play a different role depending on what kinds of service or in formation should be provided. The results derived from this paper will help the e-commerce sites provide personalization service by collecting personal information while protecting users' privacy.

  • PDF

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

Analysis on Criminal Judgement of Child Abuse : Focus on Violations of the Child Welfare Act (아동학대범죄에 관한 형사 판결 분석 연구 : 아동복지법 위반 사례를 중심으로)

  • Lee, Sewon
    • Korean Journal of Social Welfare
    • /
    • v.67 no.2
    • /
    • pp.113-136
    • /
    • 2015
  • This study is about criminal judgement of child abuse. The purpose of this study is to analyze contents and reasons for judgements about child abuse crime in detail especially focused on elements and contents of weighing of an offense and concurrent imposition and then to suggest alternatives for policies and law-enforcement for the prevention of that crime. The data were collected from 484 written judgements on 579 criminal defendants that were related to 'Violation of the Child Welfare Act' and were conducted by content analysis. The results are as follows. First, Only about 25% criminal defendants were guilty of violations of the Child Welfare Act were sentenced to imprisonment and the rest of them(about 75%) were merely sentenced to probation of imprisonment or fined. Second, Proportion of prison sentence or period of jail time have not been increased in spite of public indignation and upward of statutory punishment by legislation. Third, in the case of child sexual abuse, there are frequent cases in which concurrent imposition was not put, regardless of explicit statement in the related laws. Last, this study revealed that some mitigation factors of sentence that have been identical to crimes against adult have been applied to child abuse crime uncritically, for example agreement and regret and so on. On the basis of such results, this study proposed policy alternatives for prevention of the recurrence of child abuse, i.e. intrinsic standard of weighing of an offense, concurrent imposition to perpetrators of child abuse and so on.

  • PDF

A Comparative Analysis on Safety Evaluation System in the PQ Process of Public Construction Projects - Focus on PQ process in Korea and Los Angeles, California, USA - (공공공사의 PQ 심사 시 안전평가체계 비교분석 - 한국과 미국 캘리포니아 주 LA지역의 PQ 제도를 중심으로 -)

  • Park, Heetaek;Oh, ChiDon;Park, Chansik;Choi, Jinwoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2013
  • The converted accident rates that included in Pre-Qualification (PQ) are to evaluate the results of accidents which have occurred. Therefore, it is demanded the development of proactive evaluation contents to evaluate the safety management activities and efforts on construction companies. The purpose of this study is to provide basic data for the establishment of proactive evaluation contents at public construction project in Korea through the collected and analyzed the PQ documentation applied by public agencies in Los Angeles, USA. The results indicated that diverse reactive safety evaluations are implemented to examine accidents which occurred in past projects such as occupational health insurance, regulation violation. And also, when the accidents occurred, it is evaluated the proactive safety management actions such as safety education, accident prevention programs, and safety management plans are reflected on the evaluation. Thus, if proactive safety related evaluation contents are established and reflected in PQ examinations together with diverse existing reactive safety evaluations considering converted accident rates, not only the existing function of converted accident rates can be reinforced but also businesses' active safety management activities can be induced and decreases in the construction industry's accident rate can be expected.

QoS-Aware Call Admission Control for Multimedia over CDMA Network (CDMA 무선망상의 멀티미디어 서비스를 위한 QoS 제공 호 제어 기법)

  • 정용찬;정세정;신지태
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.106-115
    • /
    • 2003
  • Diverse multimedia services will be deployed at hand on 3G-and-beyond multi-service CDMA systems in order to satisfy different quality of service (QoS) according to traffic types. In order to use appropriate resources efficiently the call admission control (CAC) as a major resource control mechanism needs to be used to take care of efficient utilization of limited resources. In this paper, we propose a QoS-aware CAC (QCAC) that is enabled to provide service fairness and service differentiation in accordance with priority order and that applies the different thresholds in received power considering different QoS requirements such as different bit error rates (BER) when adopting total received power as the ceil load estimation. The proposed QCAC calculates the different thresholds of the different traffic types based on different required BER applies it for admission policy, and can get service fairness and differentiation in terms of call dropping probability as a main performance metric. The QCAC is aware of the QoS requirement per traffic type and allows admission discrimination according to traffic types in order to minimize the probability of QoS violation. Also the CAC needs to consider the resource allocation schemes such as complete sharing (CS), complete partitioning (CP), and priority sharing(PS) in order to provide fairness and service differentiation among traffic types. Among them, PS is closely related with the proposed QCAC having differently calculated threshold per each traffic type according to traffic priority orders.

Discriminatory Financial Measures on Non-Cooperative Jurisdictions and their Compatibility with the WTO GATS: Focus on the Appellate Body Report on Argentina-Financial Services (조세투명성에 협력하지 않는 국가에 대한 차별적 금융조치의 WTO GATS 합치성 - Argentina-Financial Services 상소기구보고서에 대한 분석을 중심으로 -)

  • Yoo, Hee Jin
    • International Commerce and Information Review
    • /
    • v.19 no.4
    • /
    • pp.95-124
    • /
    • 2017
  • The dispute analysed in this article concern eight measures taken by Argentina regarding finance, taxation, foreign exchange, and registration. The dispute centered on whether these measures were in violation of the Member's obligations under the General Agreement on Trade in Services (GATS), namely most-favored national treatment, national treatment and market access, and whether they are justified by Article XIV and Article 2(a) of the Annex on Financial Services. Important arguments raised in the dispute include whether the services and the service providers of cooperative and non-cooperative countries and/or Argentina subjected to the measures are like for the purposes of Article II and Article XVII of the GATS, whether the regulatory aspects of the measures are to be considered in determining the inconsistency with Article II and Article XVII of the GATS, and whether the measures are justified in that they were taken in accordance with the national laws and regulations aimed at implementing the Global Forum on Transparency and Exchange of Information for Tax Purposes and the Financial Action Task Force. The essence of this dispute lies in the balance of each Member's right to regulate commercial and/or financial activities and its obligations under the GATS. The Appellate Body tried to strike such a balance in its assessment of: (i) likeness of services and service suppliers, (ii) no less favorable treatment under Articles II and XVII, and (iii) the scope of measures under Article 2(a) of the Annex on Financial Services. This article aims to provide an analysis of the Appellate Body's findings, giving light to the relevant jurisprudence and scholars' writings.

  • PDF

An Exploration on Personal Information Regulation Factors and Data Combination Factors Affecting Big Data Utilization (빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색)

  • Kim, Sang-Gwang;Kim, Sun-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.287-304
    • /
    • 2020
  • There have been a number of legal & policy studies on the affecting factors of big data utilization, but empirical research on the composition factors of personal information regulation or data combination, which acts as a constraint, has been hardly done due to the lack of relevant statistics. Therefore, this study empirically explores the priority of personal information regulation factors and data combination factors that influence big data utilization through Delphi Analysis. As a result of Delphi analysis, personal information regulation factors include in order of the introduction of pseudonymous information, evidence clarity of personal information de-identification, clarity of data combination regulation, clarity of personal information definition, ease of personal information consent, integration of personal information supervisory authority, consistency among personal information protection acts, adequacy punishment intensity in case of violation of law, and proper penalty level when comparing EU GDPR. Next, data combination factors were examined in order of de-identification of data combination, standardization of combined data, responsibility of data combination, type of data combination institute, data combination experience, and technical value of data combination. These findings provide implications for which policy tasks should be prioritized when designing personal information regulations and data combination policies to utilize big data.

Scalable and Accurate Intrusion Detection using n-Gram Augmented Naive Bayes and Generalized k-Truncated Suffix Tree (N-그램 증강 나이브 베이스 알고리즘과 일반화된 k-절단 서픽스트리를 이용한 확장가능하고 정확한 침입 탐지 기법)

  • Kang, Dae-Ki;Hwang, Gi-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.805-812
    • /
    • 2009
  • In many intrusion detection applications, n-gram approach has been widely applied. However, n-gram approach has shown a few problems including unscalability and double counting of features. To address those problems, we applied n-gram augmented Naive Bayes with k-truncated suffix tree (k-TST) storage mechanism directly to classify intrusive sequences and compared performance with those of Naive Bayes and Support Vector Machines (SVM) with n-gram features by the experiments on host-based intrusion detection benchmark data sets. Experimental results on the University of New Mexico (UNM) benchmark data sets show that the n-gram augmented method, which solves the problem of independence violation that happens when n-gram features are directly applied to Naive Bayes (i.e. Naive Bayes with n-gram features), yields intrusion detectors with higher accuracy than those from Naive Bayes with n-gram features and shows comparable accuracy to those from SVM with n-gram features. For the scalable and efficient counting of n-gram features, we use k-truncated suffix tree mechanism for storing n-gram features. With the k-truncated suffix tree storage mechanism, we tested the performance of the classifiers up to 20-gram, which illustrates the scalability and accuracy of n-gram augmented Naive Bayes with k-truncated suffix tree storage mechanism.