• Title/Summary/Keyword: school crime

Search Result 221, Processing Time 0.027 seconds

A Study on the Open End of Crime Movies (범죄영화의 열린 결말에 관한 연구)

  • Zhang, Shu;Choi, Won-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.101-102
    • /
    • 2019
  • 열린 결말은 예술 영화에서는 물론, 상업 영화에서도 부각되고 있는 결말의 형식이다. 이러한 형식은 '수용자의 참여'를 유도함으로써 다양한 해석의 가능성과 함께 작품이 회자되는 긍정적 효과를 거두고 있다. 특히 범죄영화에서 열린 결말은 영화의 소재에 대한 해석의 폭을 넓힘으로써 작품성을 제고하고 있다. 이에 연구자는 범죄 영화에서의 열린 결말에 대한 분류와 연구를 통해 범죄영화의 제작과 해석에 기여하고자 한다.

  • PDF

Actual Conditions of Burglaries and Analysis on Residential Invasion Burglaries in Daegu Area (강도 범죄의 실태 및 대구 지역 침입 강도 범죄 분석)

  • Lee, Sang-Ho;Kwak, Jyung-Sik
    • Journal of forensic and investigative science
    • /
    • v.2 no.2
    • /
    • pp.5-20
    • /
    • 2007
  • During the period from 2001 to 2005, 29,892 burglaries took place in Korea with the approximate average annual number - 5,978 cases. This study was conducted to analyze the reported burglaries and the result was summarized as follows. There were 8,605 residential invasion burglaries (28.8%) as the most frequent characteristic pattern. The exit was used as the most frequent invasion route for 4,031 invasion burglaries (64.3%), and an unlocked exit door or window was used as the most frequent invasion method for 2,462 invasion burglaries (28.6%). The hours just after midnight (between 00:00 and 04:00) were the most frequent time for invasion burglary to occur. Also, 5,652 burglaries occurred on Wednesday which was twice higher than on Sunday (2,988 burglaries). It was shown that the number of persons injured during burglaries were 260 deaths and 10,610 injuries. The places of the highest occurrence were the street with 10,183 burglaries (34%) and then residential place with 7,527 burglaries (approximately 25%). One-man burglary was the highest complicity: 15,012 offenders (56.1%). The knife was used as the most frequent instrument for 6,498 burglaries (24,3%) what is rare, while no criminal tool or instrument was used for 15,631 burglaries (58.4). During the period from 2001 to 2006, 1,506 burglaries occurred in Daegu and the average annual number was 251 burglaries. Among those,515 residential invasion burglaries (34.2%) took place and the average annual number was approximately 86 cases. The hours just after midnight (between 00:00 and 04:00) were the most frequent time for invasion burglary to occur (194 cases, 37.7%), the place of the highest invasion occurrence was the residential place (259 cases, 50.3%), and the exit was used as the most frequent invasion route (87 cases, 37.7%). An unlocked exit door or window was the most frequent invasion method (65 cases, 25.1%). In addition, pretending to be a delivery man, visitor or following the victim methods were used for 26 burglaries (10%). It is apparent that personal preventive measures against crimes, as well as governmental and social measures, play an important role in preventing burglaries. In particular, based on the analyzed result that an unlocked window or exit door was most frequently used for reported burglaries, it seems that there is a lack of understanding of crime prevention while little effort has been made to prevent crimes. Although everyone knows that locking a door is one of the basic measures to prevent crimes, many people tend to pay little attention to lock a door properly so burglary takes place. This study, therefore, is intended to encourage people to pay more careful attention to crime prevention, in order to help reduce the probability of burglary. With the recent improvement in social understanding of scientific crime investigation, a wide variety of police professions, including crime analysts, crime victim police counselors and coroners, have been prepared to develop the scientific crime investigation and crime analysis. In addition, it is hoped that further this study will contribute to encourage studies on crime prevention to be carried out in the future.

  • PDF

The Research on Location Monitoring Device using Exploratory Spatial Data Analysis (공간종속성 분석기반 모니터링 장비위치결정 기법)

  • Kim, Joo Hwan;Nam, Doohee;Jung, Jum Lae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.4
    • /
    • pp.124-137
    • /
    • 2018
  • The main purpose of this study is to find the hotspots of crimes that occur frequently in the space and to derive the appropriate CCTV installation location. One of the characteristics of crime is clustered around past occurrence area, and these crimes are strongly correlated. It is also possible to find the cause of the clusters and the variables that affect the crime through the history of the crime. In addition to the traditional OLS model, spatial differential model including spatial autocorrelation and spatial error model were used to select the variables influencing the five major crime rate, the theft rate and the foreign resident rate. The variables affecting the Five major crimes were positive (+) sign for the welfare and the rate of the bar cluster rate, and negative (-) for the street density. The CCTV area occupies 46% of the hotspots based on the overlapping of the areas where the elderly people are crowded, the bar cluster, many multicultural families, and the areas with low density of street lamps. It turned out. Taking into account the current CCTV operation, the total number of new cases to cover the risk point was 89.

Effects that Faith Factor of Social Bonds Have on Cyber Bullying Phenomenon (사회유대의 신념요인이 사이버 불링 가해 현상에 미치는 영향)

  • Lee, Young-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.256-262
    • /
    • 2016
  • A cyber crime has been evolving, as other crimes have. Beyond physical damages such as financial crimes in the cyber world, it has evolved into psychological forms like cyber-bullying. In today's crimes, measures that consider psychological effects of crimes are highly regarded in that fear of crime is considered as well as visible crimes. Accordingly, cyber bullying, which causes psychological damages, needs to be treated very importantly. Because the characteristics of cyber crime is caused by different circumstances from the real world, measures should be taken in different aspects. Rather than physical damages, which can be found in the conventional crimes, cyber crimes cause psychological damages, so the effect that has on inflicting should be specified. Especially, in the environment that virtual reality is ubiquitous through smart phones, it is very difficult to establish measures by considering all the causes of general cyber crimes. Therefore, this study estimated what affects cyber bullying by focusing on personalized faith factor among social bond theory, which can control cyber crimes. As a result, self-controling faith was verified to have a negative effect on cyber bullying, so faith is a very important factor in personalized environment. Thus, it is suggested that the characteristics of cyber space and education of humanism, which can affect individuals' faith should be emphasized.

Development of Online Education Program and Feasibility Study on Cyberbullying Response in Schools since COVID-19 (코로나-19 이후 증가한 학교 사이버폭력 대응에 대한 온라인 교육 프로그램 개발과 타당성 연구)

  • Choi, Eunsun;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1071-1082
    • /
    • 2021
  • COVID-19 has changed a lot in our daily lives, where school classes and remote classes have been combined or converted to remote classes. Many students spent more time online, and cyberbullying, such as indiscriminate disclosure of their personal information, bullying of their classmates online, increased. In this paper, we propose an online education program as a countermeasure against cyberbullying. This program is designed for elementary, middle, and high school students and can also be used for informatics or ethics classes in the 2015 curriculum. The proposed program is divided into four major themes: 'Cyberbullying,' 'Information Security,' 'Cyber Crime,' and 'Language Violence,' and is divided into a total of ten topics according to its connection. It was organized to teach the topics evenly by grade. Also, the program's feasibility was verified by experts on the selection of educational contents and organizing of contents. In the future, it will be necessary to apply for this program and conduct an effectiveness analysis to measure whether it has effectively contributed to the decrease in cyberbullying rates among students and the improvement of coping skills.

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

LED Signage for Crime Prevention using Artificial Intelligence (범죄예방을 위한 LED 안내판에 대한 인공지능 연구)

  • Yang, Bee-seul;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.180-182
    • /
    • 2022
  • As various crimes such as theft, assault, and sex crimes are increasing, each local government is installing CCTVs to prevent them, and operating and managing control centers for emergency response. When the control center detects a dangerous situation in the field, it responds immediately in connection with the police or 911. However, since it is managed by humans, the response speed is anomalous and the reality is that it is mainly used for post-processing. Therefore, through the artificial intelligence LED signage, it notifies the emergency situation at the site, and it serves as a warning function before getting help from passers-by or an accident occurs. In this paper, we design and research a warning system such as changing the lighting color of the LED signboard or making a sound by reflecting the artificial intelligence algorithm. We intend to contribute to public safety and social safety through this study.

  • PDF

A WSN-based Safety Management System in School-Zone (무선센서네트워크 기반의 스쿨존 안전관리 시스템)

  • Lee, Chang-Bok;Lee, Jin-Kwan;Park, Sang-Jun;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.19-27
    • /
    • 2009
  • In this paper, we propose a safety management system which prevents the occurrence of crime and accident from rising in school neighborhood. This system offers a monitoring method for safety of children which make intelligent space from environment and location sensing data through wireless communication between sensors attached to children and fixed sensor network in school neighborhood. Also, We propose a strategic safety management plan using opportunistic network when node is out of school zone network. Many students can easily receive the service of low cost from WSN-based School zone network than existing service from GPS individually by using our scheme.

  • PDF

A Precursor Phenomena Analysis of APT Hacking Attack and IP Traceback (APT 해킹 공격에 대한 전조현상 분석 및 IP역추적)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.275-278
    • /
    • 2013
  • Log is a file system, a system that uses all remaining data. Want situation now being issued in the IT, media Nate on information disclosure, the press agency server hack by numbness crime occurred. Hacking crisis that's going through this log analysis software professionally for professional analysis is needed. The present study, about APT attacks happening intelligently Log In case of more than traceback in advance to prevent the technology to analyze the pattern for log analysis techniques.

  • PDF

A Network Transport System Using Next Generation CCN Technology

  • Lee, Hyung-Su;Park, Jae-Pyo;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.93-100
    • /
    • 2017
  • Current internet has evolved from the sharing and efficiency aspects of information, it is still vulnerable to the fact that the Internet is not secure in terms of security and is not safe to secure of security mechanism. Repeating patches on continuous hacking are continuously demanding additional resources for network or system equipment, and consequently the costs continue to increase. Businesses and individuals alike are speeding up the damage caused by crime like of ransomware, not jusy simple attacks, and businesses and individuals need to respond to cyber security. In addition, the ongoing introduce of security device, and separate of networks for secure transmission of contents in the existing TCP/IP system, but it is still lacking in security. To complement the security implications of this existing TCP/IP Internet Protocol, we intend to propose a Secure Contents Transport System (SCTS) on the network using the CCN concept.