• 제목/요약/키워드: illegal activities

검색결과 122건 처리시간 0.024초

굴패각으로 인한 산업부산물 발생과 처리현황 실태조사 (A Field Survey on the Generation of Industrial Waste Oyster Shells and their Disposal Status)

  • 김지현;송원호;문훈;정철우;이재용
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2013년도 추계 학술논문 발표대회
    • /
    • pp.146-147
    • /
    • 2013
  • The oyster shells of about 240,000 tons have been annually produced in south coast of South Korea. However, about 25% of the oyster shells (60,000tons) was recycled as oyster seeding and fertilizer due to the limited amount of consumption for such purposes. The stored amount of oyster shell in the fertilizer manufacturing company is overfilled, and thus cannot accept any more of the waste oyster shells. As a result, landfill and illegal dumping of waste oyster shells have become an increasingly serious issue since 2011. In this research, the problems generated by the oyster shells were investigated through surveying activities. One of the possible alternative solutions that can process large amount of waste economically was found to be the application of oyster shells as a construction materials.

  • PDF

Interest based-participation requiring accountability in greening

  • Park, Mi Sun
    • Forest Science and Technology
    • /
    • 제14권4호
    • /
    • pp.169-180
    • /
    • 2018
  • The Republic of Korea (ROK) has had a successful experience in greening its land because of strong state policy and public participation. This paper aims to analyze the interest positions, participation, and accountability of multiple actors in the process of greening movements in the ROK. These movements were divided into two phases: forest rehabilitation (1973-1997) and urban greening (1998-2017). During the first phase, farmers caused deforestation by slash-and-burn farming and illegal logging, and governmental agencies acted as helpers controlled the farmers' deforestation activities. During the second phase, government agencies and enterprises caused deforestation with urban development projects, including construction of housings and roads. Multiple actors including citizens, NGOs, and enterprises helped urban greening through campaigns, donations, and monitoring. As a result, managing interest positions is significant to motivate multiple actors to participate in the greening movement. Participation with clear accountability is meaningful for successful greening. Therefore interest-based participation requiring accountability contributes to greening. This phenomenon indicates interconnection for interest positions, participation and accountability should be considered in designing greening policies.

Random Forest Classifier-based Ship Type Prediction with Limited Ship Information of AIS and V-Pass

  • Jeon, Ho-Kun;Han, Jae Rim
    • 대한원격탐사학회지
    • /
    • 제38권4호
    • /
    • pp.435-446
    • /
    • 2022
  • Identifying ship types is an important process to prevent illegal activities on territorial waters and assess marine traffic of Vessel Traffic Services Officer (VTSO). However, the Terrestrial Automatic Identification System (T-AIS) collected at the ground station has over 50% of vessels that do not contain the ship type information. Therefore, this study proposes a method of identifying ship types through the Random Forest Classifier (RFC) from dynamic and static data of AIS and V-Pass for one year and the Ulsan waters. With the hypothesis that six features, the speed, course, length, breadth, time, and location, enable to estimate of the ship type, four classification models were generated depending on length or breadth information since 81.9% of ships fully contain the two information. The accuracy were average 96.4% and 77.4% in the presence and absence of size information. The result shows that the proposed method is adaptable to identifying ship types.

Exploring the Challenges and Strategies for Combating Advertising Fraud and Preserving Brand Reputation in the Korean Advertising Landscape

  • Seung-Chul Yoo;Yoontaek Sung
    • International Journal of Advanced Culture Technology
    • /
    • 제11권1호
    • /
    • pp.306-311
    • /
    • 2023
  • As digital advertising continues to dominate the advertising industry and experience substantial growth, associated criminal activities such as advertising fraud and brand safety risks have become increasingly prevalent. Despite the severity and extent of these crimes, the response in Korea has been lackluster, often perceiving them merely as losses in advertising expenses incurred by corporations. However, it is important to note that these issues have direct repercussions on the end-consumer in the form of increased prices for goods and services. Furthermore, illegal and intrusive advertisements not only cause inconvenience to the viewer, but may also indiscriminately target cognitively vulnerable groups, such as children and the elderly, with the intention of manipulating advertising metrics and artificially inflating performance indicators. In this study, we aim to explore the concept and significance of advertising fraud and brand safety, and to evaluate the current measures taken in the Korean market. Additionally, we will delve into the implications of related policies and emphasize the necessity of digital advertising literacy in addressing these issues.

역사상 해적과 국제법상 해적 : 바이킹 해적을 중심으로 (Pirates in History and International Law Centering around the Viking Pirates)

  • 김주식
    • Strategy21
    • /
    • 통권30호
    • /
    • pp.263-285
    • /
    • 2012
  • History, demonstrating convincingly that pirates have arisen continuously for a lengthy period of time throughout the world, is able to become a cooperative study of international law in terms of pirates matters ; Viking pirates. There are beneficial topics for the study of true nature of viking activities and the settlement of present pirates matters ; How were the pirates activities of Vikings, What sort of relations do they have between Vikings and other pirates which have arisen in world history, What are the differences compared to present concept of pirates. There were active pirates activities in the coast and waters of Scandinavia even before the period of the Migration Age because of geographical condition. With those experiences, Vikings began to ambush Britain Islands sailing across the North Sea since the late 8C, ages of migration in earnest. They ambushed all coasts of the European Continent expending boundary until the late of 11C. Pirate activities in a sort of guerrilla operations were operated when they encountered Islams in the Iberian Peninsula and the coast of North Africa. They showed twofold attitudes ; if the defence of the region and sea was weak, they plundered, or if strong, traded. In plundered europeans' position, Vikings were pirates with cruelty and barbarians. In vikings position, they were normal human beings who did a pirate activity to lead a better life. Viking pirates showed different characteristics in terms of three aspects ; area and aspect of action, activity after piracy. Meanwhile, Viking pirates showed several differences with pirates defined in terms of modern international law. Among the satisfying conditions of pirates, required by the international law of the sea, Vikings fulfilled animus furandi, desire for gain, activities for hatred and revenge, and private ends. Other conditions including attacking authority of the vessels, activities toward private ships, activities in the coast and the land, and illegal terroristic activities toward ships are found in viking pirates. However, Viking pirates do not show the activities in high seas and in the outside of a State's jurisdiction. In addition, it cannot be excluded that they pirated with vessels of regional leaders and the Sovereign, not private ships. Contrary to the definition of concept in terms of modern international law toward pirates, Viking invaded foreign waters, came on shore to foreign land and island, went up-stream the rivers to the back of interior, and attacked churches and abbeys. Strangely, they sometimes settled down in the places where they had pirated. Today, pirates appearing in history and defined in international law exist simultaneously and separately. It means, the historical nature and the nature under the international law are turning up differently. Historical cases of pirates should be reflected to modern international law. If so, it seems that the clue to solve pirate problems can be arranged. History is the immortal living thing, which not just existed as a past but reflects present.

  • PDF

소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략 (Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis)

  • 정태진
    • 융합보안논문지
    • /
    • 제16권2호
    • /
    • pp.25-34
    • /
    • 2016
  • 이 연구는 소셜네트워크 분석(SNA: Social Network Analysis)기법을 활용하여 SNS상에서 위험한 인물들의 활동을 파악하고 그들의 불법행위에 대한 차단, 분리 또는 대응하여 큰 위협을 사전에 예방하는데 목적이 있다. SNA는 시스템적으로 많은 사람들의 개인정보와 관계를 분석하여 수사의 효과성과 효율성을 높이고 개인과 용의자와의 복잡한 사회적 관계를 찾아내어 어떻게 그들이 온라인상에서 만나 관계를 맺을 수 있었는지를 보여준다. 소셜네트워크는 전 세계 사람들이 거리와 지리적인 제약을 받지 않고 관계를 맺고 교류할 수 있고 엄청난 양의 정보 또한 공유가 가능케 될 만큼 빠르게 확산되었다. 세계적으로 많이 사용되고 있는 페이스북(Facebook)이나 트위터(Twitter) 같은 소셜네트워크 서비스(SNS: Social Network Service)를 이용한 범죄행위가 급증하고 있는 가운데 최근 테러리스트 그룹인 IS는 그들의 웹사이트를 통해서 자신들의 활동을 외부에 알리기도 하고 그들의 테러행위를 위한 모병활동도 하고 있다. 테러리스트 집단들은 소셜네트워크가 비교적 비용이 적게 들면서도 그들의 목적을 쉽게 달성 할 수 있기에 이를 많이 활용한다. 그러나 그 파급효과가 너무나 크기에 그들의 활동을 차단하는 것이 급선무이다. 따라서 이 연구는 소셜네트워크 상에서 범죄자나 테러리스트들의 활동에 대해 자세히 설명하고 어떻게 그들의 활동을 효과적으로 감지하고 차단하고 대응 할 수 있는지 보여준다. 그리고 앞으로 필요한 연구에 대해서도 제시한다.

비율(보합) 급제하에서 어업(자원)관리에 관한 연구 - 대형기선저인망어업을 중심으로 - (A Study on Fisheries Resource Management Under the Rate Payment System - In Case of Large Trawl Fisheries -)

  • 박성쾌
    • 수산경영론집
    • /
    • 제36권3호
    • /
    • pp.1-24
    • /
    • 2005
  • Korean fishery wage system has been evolved with the different titles. However, Since the law of fishing crew was enacted in 1984, the fishery wage system has been established as a rate system, which is a legal term. The present rate system in practice shows various contents and modalities, depending on fisheries and regions, but the fisheries of large trawl cooperative employ a rate system of fixed plus rate wage. However, such change did not transform basically the properties of pure rate scheme. As well known, fishing vessel owners face an awful lot of difficulty in managing and controlling effectively the production process because fishing activities are carried out in the seas remote from the land. Thus, it tend to be inevitable for vessel owners to employ a rate system to induce fishermen's positive motivation for promoting productivity and saving operating costs. However, the rate system has worked out as a driving force, which induce an increase in production more strongly under the expansion of vessel numbers and power and the keener competition of fishing activities. Even though the control mechanism of fishing instruments are well established, fishermen become naturally to have an incentive to increase their fishing effort for maximizing production since they are able to raise their shares by maximizing the quantity harvested. Thus, as far as the rate system exists, fisheries administration may have much difficulty in realizing its fishery management goals only through vessel reduction and fishing gear regulations. Also, under the rate system fishery management authority may be in face of a serious dilemma between the spontaneous rate system and vessel reduction policy. If the realistic aspect of the rate system is recognized and resource restoration and profit promotion are main policy goals, it is necessary to develop effective ways to control vessel owners' and fishermen's production-maximizing motives at an appropriate level. From this point of view, it seems reasonable to introduce TAC system by species or by fisheries into the existing fishery system. The research results suggest that if the fisheries administration could understand clearly the spontaneous fisheries wage system, it would know the norm of TAC and the basic reasons for illegal fishing activities and thus it would be able to develop and implement more realistic resource management policies.

  • PDF

디지털 관련 사회문제와 탐정의 역할 (A Study on Private Investigator's Role against Digital Related Social Problems)

  • 허명범;김권호;염건령
    • 산업진흥연구
    • /
    • 제8권4호
    • /
    • pp.177-186
    • /
    • 2023
  • 현대사회는 디지털 사회로 불릴 정도로 인터넷과 무선 네트워크망, 디지털 기기를 기반으로 한 운영이 이뤄지고 있다. 특히, 금융거래나 정보의 이동, 상업활동 대부분이 온라인을 기반으로 이뤄지면서, 이와 관련한 여러 가지 사회문제와 부작용들이 급증하고 있는 실정이다. 대표적인 예로서 산업스파이 활동이나 산업기술 유출이 있으며, 온라인을 이용한 마약 등의 불법 재화 거래, 온라인 도박 등의 사회문제가 심각한 수준으로 늘어나고 있다. 이와 같은 디지털을 기반으로 한 사회문제를 경찰이나 검찰과 같은 사법기관의 활동과 능력만으로 해결할 수 없으며, 이제는 탐정시장이 개방되었기 때문에 이들을 이용한 적극적인 개입이 필요하다. 이를 위해서는 디지털 사회문제 및 범죄문제와 관련하여 탐정의 조사능력 및 증거수집능력을 적극적으로 배양해야 하며, 각 탐정교육기관이나 협회들이 이에 대한 투자와 연구에 적극적으로 나서야 할 것이다.

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권5호
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

A study on procedures of search and seize in digital data

  • Kim, Woon Go
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권2호
    • /
    • pp.133-139
    • /
    • 2017
  • Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.