• Title/Summary/Keyword: crime in social network services

Search Result 11, Processing Time 0.024 seconds

An Empirical Test of Social Learning Theory and Complementary Approach in Explanation of University Students' Crimes in Social Network Services (SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증)

  • Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.91-104
    • /
    • 2015
  • This study tests the effects of differential association, definitions, differential reinforcement and imitation from social learning theory in the explanation of university students' crimes in social network services. In addition, this study tests the interaction effects between social learning factors and other factors such as low self-control, subcultural environment, and crime opportunity for the integrated approach. Using data from 486 university students in Seoul, results show that both definition and imitation have significant influences on crimes, even though differential association and differential reinforcement factors have no significant influences on crimes in social network services. Results also reveal that there are significant interaction effects between definition and subcultural environment, which meana that definition has a strong effect on crimes in high subcultural environment. In addition, it is found that reinforcement has also a strong effect on crimes in high crime opportunity and that interaction effect between imitation and low self-control is significant, which means that imitation has a strong effect on crimes in low self-control students.

Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service (소셜 네트워크 서비스에서 사건 수사를 위한 모바일 디지털 포렌식 절차에 관한 연구)

  • Jang, Yu Jong;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.3
    • /
    • pp.325-331
    • /
    • 2013
  • Social network services(SNS) has been used as a means of communication for user or express themselves user. Therefore, SNS has a variety of information. This information is useful to help the investigation can be used as evidence. In this paper, A study of mobile digital forensic procedure for crime investigation in social network service. Analysis of database file taken from the smartphone at social network service application for mobile digital forensic procedure. Therefore, we propose a procedure for the efficient investigation of social network service mobile digital forensic.

The Relationship Between Social Security Network and Security Life Satisfaction in Community Residents: Scale Development and Application of Social Security Network (사회안전망과 지역사회주민의 안전생활만족의 관계: 사회안전망 척도개발과 적용)

  • Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.108-118
    • /
    • 2014
  • The purpose of this study is to develop a relationship of measuring method for the social security network and verify its validity and reliability and apply it to investigate the due to security life satisfaction. This study is based by setting general residents of Seoul in 2013 and using the stratified cluster random sampling method to analyze a total amount of 203 examples. The measuring methods for the social security network was developed through document research, conceptual definition and drafting the survey, experts' conference, preliminary inspection and original examination, verification of the validity and reliability of the survey. An experts' conference took pace to verify the validity of the survey, and 6 factors were extracted through exploratory factor analysis crime prevention design, street CCTV facilities, volunteer neighborhood patrol, local government security education, police public peace service, private security service. The conclusion are the following. Collected data was analyzed based on the aim of this study using SPSSWIN 18.0, and practice frequency analysis, F test, factor analysis, reliability analysis, correlation analysis, multiple regression analysis. First, the validity of the social security network measurement is very high. Thus, the factors constituting the social security network were found to be crime prevention design, street CCTV facilities, volunteer neighborhood patrol, local government security education, police public peace services, and private security services, and the crime prevention design factor was found to be most explanatory. Second, the reliability of the social security network measurement is very high. Thus, the correlation between the questions and the sector, the questions and the social security net was very high, and the internal consistency showed a Cronbach's${\alpha}$ value of over 0.865. Third, the establishment of a social security network had the biggest effect on people in their forties. Thus, when the crime prevention design, street CCTV facilities, local government security education, police public peace services are systematically established, the social anxiety of citizens was reduced.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

A Study on the U-Korean Traditional Residence introduced Ubiquitous Services in a Traditional Residence (유비쿼터스 기반 U-한옥의 서비스모델 연구)

  • Joung, In-Sang;Lee, Kang-Hoon
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.12 no.3
    • /
    • pp.47-56
    • /
    • 2010
  • In a study of a peculiarity of the Korean residence construction as the central Jeong Yeo Chang's Residence, we proposed varieties service models for an anthropocentric U-Korean style with "a convenience, a security, an economical, a pleasure". It was to assume for this research that was established in case of all necessity IT infrastructures, and was structural alterations to a Korean residence sectional. It was used for Wall-Pad(Home Gateway) for controlling services, gas valves, remote inspection of a meter, curtains, doorlocks, boilers, temperature controllers, indoor ventilation systems, breakers, and expansion of crime prevention, energy. With introducing various service models on U-Korean style house, removing a negative view about Korean residence, we drew the best suited residence condition combining with a merit of the Korean residence and the Ubiquitous Intelligent Home Service. In order to realize U-Korean style house at the right time at the right place, a maintenance was required to be ensured based on social infrastructures and institutions and laws.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift (정부 ICT R&D 중장기전략과 ICT 패러다임 변화를 반영한 디지털 포렌식 표준정립을 위한 기술-정책적 통합프로세스 프레임워크)

  • Shin, Jun Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1495-1504
    • /
    • 2014
  • Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

A Study on the Actual Situation of Domestic Violence and the Problems of Victims of Domestic Violence and Preventive Measures (가정폭력의 실태 및 피해 가정 문제와 예방대책에 관한 연구)

  • Bae, Na Rae
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.187-193
    • /
    • 2022
  • Domestic violence in our society is where the abuser and the abuser live in the same space. Problems are left unresolved in families where abuse is reproducing. Domestic violence can be viewed as a crime that violates and tramples human rights. They rely solely on family support networks for solutions to domestic violence. The physical, emotional, and psychological pain and wounds that victims of domestic violence must endure are too deep. In order to help victims of domestic violence, case management services that can provide long-term and attentive help in the neighborhood or community are needed. For this, prevention and treatment of domestic violence should be considered together. And the interest and professional role of the community must follow.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.