• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.038 seconds

The Comparison on the Investigative Training between the Current Korean National Police and the Law Enforcement Agencies of U.S.A. and Germany (현 대한민국 경찰의 수사교육과 미국, 독일 수사기관과의 비교)

  • Kim, Dae-Sik;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.52-80
    • /
    • 2007
  • In the rapidly changing current society, the Korean National Police(KNP) is facing a lot of demands from the citizens like the protection of subject/victim rights, independence of investigation authority, disclosure of actual truth, and prevention & eradication of crimes. It is widely recognized among the Korean people and the police that the KNP is always standing for the rights of the people and it is high time that the KNP should be restored as the pioneer for the protection of human right. In this situation, the tremendous emphasis is given on the importance of investment in investigative training through the long-term master-plan in order to renovate its constitution, to level up its quality, and to cope with the highly sophisticated crime patterns. Korean police have already shown its outstanding investigative skills of identification of the deceased throughout large cases like Daegu subway arson and tsunami in Southeast Asia. In addition, the skills of cyber crime investigation are highly recognized by foreign law enforcement agencies. However, the investigative skills and abilities are being degraded and the morale of the investigative personnel are falling due to the insufficiently of the finite training budget. Lack of financial support results in the lack of training program and poor training environment, which subsequently leads to the inefficiency of training. Additionally, no long-term budget for fostering specialized investigative agents is allotted. Considering the fact that more than 95% of crimes in Korea are being primarily investigated by the Korean police, we have to understand the importance of the police. By the tremendous investment in investigative training which can lead to the high-quality investigations, the Korean police can ultimately contribute to the protection of safety and life of its people.

  • PDF

How to Acquire the Evidence Capability of Video Images Taken by Drone (드론으로 촬영한 영상물의 증거능력 확보방안)

  • Kim, Yong-Jin;Song, Jae-Keun;Lee, Gyu-An
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.163-168
    • /
    • 2018
  • With the advent of the fourth industrial revolution era, the use of drone has been progressing rapidly in various fields. Now the drones will be used extensively in the area of investigation. Until now the criminal photographs stayed in 2D digital images, it would be possible to reproduce not only 3D images but also make a crime scene with 3D printer. Firstly, the video images taken by the investigation agency using the drones are digital image evidence, and the requirements for securing the evidence capability are not different from the conditions for obtaining the proof of digital evidence. However, when the drones become a new area of scientific investigation, it is essential to systematize the authenticity of the images taken by the drones so that they can be used as evidence. In this paper, I propose a method to secure the evidence capability of digital images taken by drone.

Written Voice in the Text: Investigating Rhetorical Patterns and Practices for English Letter Writing (텍스트 속 자신의 표현: 영어 편지글에 나타난 수사 형태와 작문 활동에 관한 탐색)

  • Lee, Younghwa
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.432-439
    • /
    • 2020
  • This study aims at exploring features of Korean university students' written text, focusing on the written voice, rhetorical patterns, and writing practices through English letters. The data comprised examples of students' English job applications, and a 'purpose-will' model was adopted for the data analysis. The findings showed that the students used unique ways of strategies to convey their voice in a recontextualized setting. Their written voice in the job applications were various, and nobody applied the Korean convention of weather opening. Their rhetorical patterns were a transformation from convergence to divergence, showing integrated patterns of written voice. Students' writing practices revealed their internal values of writing for a task, and they do not directly learn from the teacher's syllabus. This supports the sociocultural framework that learning is a situated activity in a specific discourse community. The study concludes that writing teachers should understand that life-world and learning experience can impact on students' written voice and practices.

A Study on the Securing Political Neutrality of the Prosecution Service (검찰의 정치적 중립성 확보방안 연구)

  • Kim, Taek;Jung, In whan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.59-66
    • /
    • 2020
  • This paper considered the measures of securing political neutrality of the prosecutor on the reform of the prosecution. The nation's prosecution has enormous authority. In the meantime, the prosecution enjoyed unlimited power uncontrolled with investigative rights, prosecution monopoly, and police investigation command. No other country has as much power as the Korean prosecution. However, the prosecution, which enjoys such power, is placed on the task of reforming the prosecution due to poor democratic control. Has there been such a prosecutor in Korean history who only looks forward and wields long sword ehrflqtjdrhk against corruption in power? So far, the prosecution has conducted investigations that suit the administration's taste, and the prosecutors have been on the rise in return. That is why the previous administrations tried to ensure the political neutrality of the prosecution. As such, We would like to consider legal logic to analyze the sincerity of the prosecution reform. To this end, the first is to consider the authority of prosecutors and prosecutors. Second, consider the internal requirements of the government's reform of the prosecution. Third, establish the direction of prosecution reform.

Analysis on Features of Streamwater usage in Nakdong-River (낙동강 유역의 하천수 사용 특성 분석)

  • Choi, Kyu-Hyun;Hong, Sung-Hun;Kim, Joung-Ho;Song, In-Kwon;Kim, Min-Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.1375-1379
    • /
    • 2010
  • 물관리 주무부처인 국토해양부(이하 국토부)는 최근의 전 세계적인 기후변화와 더불어 유역의 도시화 등으로 인해 급격한 하천환경 및 사회적 여건변화에 맞추어 "하천법"을 전부개정(법률 제8338호)하여 2008년 4월 7일부터 시행하고 있다. 개정 "하천법"에서는 하천수 사용 관리 조정기능이 크게 강화되어 국가 및 지방하천에서 하천수를 취수하여 특정용도로 사용하려는 경우, 그 취수량에 관계없이 누구나 관할 홍수통제소장에게 허가를 받아야한다. 따라서 국토부 소속기관이자 국가 물관리 전문기관인 홍수통제소는 수문조사, 이수(하천유량 관리 등) 및 치수(홍수예보 등) 등의 주요업무 중 기존 국가하천에 국한되었던 하천수사용 관리를 지방하천까지 확대하게 되었다. 본 연구에서는 하천법에 따라 집행된 2009년 국가하천, 지방하천 및 일시적인 하천수 사용 인 허가 행위 등 하천수관리 현황자료를 조사 정리하였다. 현황 자료를 토대로 행정구역(시 도)별, 수계별, 용도별, 허가량별, 월별 분석을 수행하고 그 특성을 파악하였다. 그리고 일시적인 하천수사용은 상기 분석 이외에 하천등급별, 공사종별 분석을 수행하였다. 2009년 총 152건(반려, 취소 등을 제외한 행위는 총 131건 : 국가하천 43건, 지방하천 33건, 일시적인 하천수 55건)의 기본적인 통계분석을 통하여 낙동강유역의 하천수사용 특성을 제시하고, 파악된 하천수사용 특성 결과는 낙동강유역의 물관리정책에 소중한 기초자료로 활용될 것으로 판단된다.

  • PDF

[Secondary publication] Sudden Aortic Rupture in Ehlers-Danlos Syndrome Type IV (엘러스-단로스 제4형 증후군 환자에서 발생한 대동맥 파열)

  • Baek, Taehwa;Kim, Minjung;Ki, Chang-Seok;Park, Seong Hwan;Lee, Heon;Kim, Kyung Ryoul;Choi, Byung-Ha
    • The Korean Journal of Legal Medicine
    • /
    • v.40 no.2
    • /
    • pp.61-64
    • /
    • 2016
  • Ehlers-Danlos syndrome type IV (EDS IV) is a hereditary disorder of the connective tissue, characterized by easy bruising, thin skin with visible veins, and spontaneous rupture of the large arteries, uterus, or bowel. EDS IV is caused by mutations of the gene for type III procollagen (COL3A1), resulting in insufficient collagen production or a defect in the structure of collagen. EDS IV can have fatal complications such as the rupture of great vessels or organs, which can cause hemorrhaging and sudden unexpected death. Here, we report a case of a 43-year-old female who collapsed after a struggle with a neighbor. In this patient, the bifurcation of the bilateral common iliac artery ruptured, with no evidence of trauma, inflammation, or atherosclerosis. Genetic analysis of COL3A1 showed the presence of a c.2771G>A (p.Gly924Arg) mutation, which may be associated with EDS IV. The forensic pathologist should consider the possibility that the spontaneous visceral or arterial rupture was caused by EDS IV. Genetic analysis is not currently a routine procedure during autopsy. However, in this case, we suggest that the patient possibly had an underlying EDS IV condition, and we recommended family members of the deceased to seek genetic analysis and counseling.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

A Study on River Water Usage by Real-time Discharge Measurement (실시간 유량계측을 이용한 하천수사용량 검토)

  • Cho, Sang UK;Song, Jae Hyeon;Roh, Young Sin;Jung, Sung Won
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.249-249
    • /
    • 2018
  • 기존의 하천수사용량 자료의 계측은 하천수 사용자의 취수여건을 고려하여 유량계 외에 가동시간에 따른 환산유량 등의 간접적인 계측방법을 인정하고 있어 자료의 객관화가 어려운 실정이다. 이에 초음파 유속계를 활용하여 기존에 사용하는 간접적인 계측방법을 평가하고 적절한 환산식을 제공하기 위하여 시험유역을 선정하고 계측시설을 설치 및 운영하였다. 하천수 사용량 수집을 위한 시험유역은 만경강의 고산~봉동 수위관측소 구간과 영산호~영암호 구간 연락수로에 ADVM(Acoustic Doppler Velocity Meter) 초음파유속계를 설치하여 실시간 자동유량측정시설을 운영하였다. 만경강의 고산~봉동 수위관측소 구간은 양수장 1개소 및 취입보 3개소의 농업용수 사용과 취수장 1개소의 공업용수 사용이 활발하게 이루어지며, 구간 내 약 20개의 배수통문 및 배수통관 그리고 하천변을 따라 수지상으로 다수의 농수로가 존재하고 있어 하천유량 파악이 매우 어렵다. 또한 영산호 홍수조절을 위한 영산호와 영암호 배수갑문 연계 운영을 위해 영산호~영암호 구간의 연락수로 유입량을 파악이 필요하나 영산호와 영암호 배수갑문 운영 및 연락수로의 제수문 운영에 따라 연락수로 유입량 파악이 어렵다. 따라서 고산~봉동 수위관측소 구간은 2015년, 영산호~영암호 구간은 2017년부터 실시간 유량계측을 통해 유량자료를 측정하고 구간 내 하천수사용량을 파악하고 있다. 본 연구에서는 2017년 운영성과를 연구범위로 하였으며, 그 결과 기존에 파악이 어려운 유량자료를 직접적인 계측방법을 통해 자료를 객관화 할 수 있었으며 추가적인 물수지 분석을 통해 효율적인 하천유량관리가 가능할 것으로 기대하고 있다.

  • PDF

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

The Simplification of information visualization using metaphor (메타포를 적용한 정보시각화의 단순화)

  • Kim, Sungkon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.303-310
    • /
    • 2021
  • A method for developing a visual information concept that analogously compares and analyzes macroscopic data changes in a simple form is needed. The development of the visual information concept requires the selection of visualization form, selection of rhetorical effects, and selection of digital expression elements. Among them, an example of a rhetorical effect selection method for effectively delivering visual information to a user is presented. In this study, metaphorical rhetoric, which allows data comparison and analysis from a macroscopic point of view, was selected for stock price analysis by period and industry. We present a two-dimensional three-stage shape change using a dandelion with spreading cockle hair as a metaphor and a three-dimensional three-stage shape change information expression method using a coral peony flower that changes shape and color according to time as a metaphor. Using this rhetorical metaphor, it is possible to compare macroscopic trading changes and stock prices by industry.