• Title/Summary/Keyword: cyber crime

Search Result 118, Processing Time 0.02 seconds

A Study on Improving Support for Victims of Cyber-Violence (사이버 폭력의 피해자 지원에 대한 개선방안)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.227-233
    • /
    • 2012
  • Recently, violence in cyberspace has been increasing and it causes not only severe emotional distress to the victims but also hampers a healthy cyber culture. This paper aims to find out about characteristics and the actual state of Cyber-Violence, and Evaluate the measures concerning it. Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation, cyber-stalking, circulation of cyber-pornography, and that is the reality there are lack of practical measures. As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal penalties. As a more fundamental measure, a greater effort of netizen's self-purification and systematic training and promotion for the prevention of damage is necessary.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.

Study on the Civil Legal Remedies against Cyber Defamation

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.93-100
    • /
    • 2018
  • Cyber defamation is the act of damaging the reputation of the other person on the Internet, and the act of attacking by the commenting the article through a word or blog. The reason why punishment is stronger than general contempt is that the nature of crime about defamation is worse than contempt. Also, punishment intensity is higher than defamation because the nature of cyber information spreads widely. Honor is not only a question of self-esteem or identity, but also a function that economically reduces the cost of seeking information or socially trustworthy. Through these two functions, it has been developed as a legal system to protect the honor as well as asking the legal sanction for defamation. However, although honor is used in various meanings in everyday life, the honor of legal level is understood in a more limited sense. It is because the law cannot actively lead and protect all honor feelings for one's feelings or mood occurred by hurt. However, if the social evaluation of a group or individual is undermined through a certain distortion of the truth, the law will actively intervene. However, due to the ambiguity of the legal sanctions standards and the identification of the parties involved in the defamation of cyberspace, it was difficult to solve the problems related to defamation in fact. Therefore, this paper will try to find out the problems of civil legal remedy due to the cyber defamation, and seek a solution for civil legal remedy.

Prevention of Women's Crime Using Autonomous car & Drones of Smart Police Efficient Multicasting Environment (스마트치안에서의 자율주행차 및 드론을 활용한 여성 범죄 예방 연구)

  • Kim, Seung-woo;Jung, Yu-jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1294-1299
    • /
    • 2018
  • 'SMART Police' means collecting, analyzing and utilizing the police database such as crime statistics, reflecting 'strategic management', 'analysis and research', 'science technology' do. In recent years, the number of sex offenses has more than doubled based on the 'crime analysis' of the Supreme Prosecutors' In this trend, we started to build a sex crime prevention program for women 's relief special 3.0 which is suitable for regional characteristics. However, it was not enough for the women to have low publicity and utilization results, and to show the practical effect. In the future, we propose a crime prevention system which can safely take home safeguarding with autonomous driving car or drone by applying ICT to the future police system. Although it is difficult to operate autonomous vehicles and drones in the surrounding environment such as narrow alleys and power lines for application to this system, it is thought that the artificial intelligence technology can be sufficiently overcome to operate.

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory (언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로)

  • Lee, Seohyun;Lee, Saerom;Kwak, Dong-heon
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.45-64
    • /
    • 2022
  • With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

Efficiency Improvement about Digital Evidence Investigation in Korea (우리나라 디지털 증거수사의 효율성 증진방안)

  • Kang, Maeng-Jin;Kim, Joung-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.180-190
    • /
    • 2007
  • Recently investigation institutions have found the clue leading to solution of the problem by digital evidence. Digital medium is used extensively in real life. Accordingly, offender is leaving from traces of crime to digital form. But, Korea's digital evidence investigation is low level yet. Definite legislation about digital evidence is not readied in present our country. And professional investigation manpower about digital evidence is insufficient. These problem may have to be supplemented urgently. Systematic, technological supporting is required. Specialize and discussed digital evidence investigation's controversial point and capacity reinforcement way for efficient confrontation in cyber crime who is diversified gradually in text.

Tools and Experience of Turkey in Coping IT Crimes

  • Gurol, Mehmet Ali
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • By no means rapid advances in technology affects the working and improvement of all systems built to increase the quality/standards of human living. Information technologies as the main driving force of technological progress today happen to be a sine qua non for all organizations hoping to keep pace with or surpass rivals. However, despite their vital advantages it is true that these create undesirable side effects that harm social systems and the rights of persons. Similar to all others in the world Turkey is trying to cope with the problem through creating an appropriate legal and administrative substructure trusted to discontinue or at least minimize such criminal acts.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF