• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.031 seconds

A Study on Influence of Korea-EU FTA Ratification upon Legal Service and Forensic Investigation (한-EU FTA 비준에 따르는 법률서비스가 포렌식 수사에 미치는 영향 연구)

  • Lee, Gyu-An
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.683-688
    • /
    • 2011
  • Korea-EU FTA, which came to an agreement in April of 2007, was resolved at the National Assembly in May of 2011, thereby having been concluded the ratification. As for the procedure of opening a market in legal service according to settlement and ratification of Korea-EU FTA, Step 1 is allowed the establishment of representative office(law firm with foreign-law consultation) at home by EU member countries' law firms. Step 2 is made available for law firm with foreign-law consultation to jointly handle and distribute profits as for a case that is mixed the domestic law firm and the domestic & foreign laws. Step 3 is allowed EU member countries' law firm to establish a joint venture with domestic law firm. This study researches into a change and influence upon legal service and forensic investigation according to Korea-EU FTA ratification. Also, it researches into position and prospect that digital forensic evidence, which possesses the majority of legal evidences, takes up in the middle of court-oriented trials. The prediction of influence in digital evidence as professional proof upon judgment will led to being capable of coping with the opening of legal service market and of wisely preparing for the advance to domestic market by law firm of Anglo-American Law.

A Study on Voice Phishing Countermeasures of the Police (보이스피싱에 대한 경찰의 대응방안에 관한 연구)

  • Kim, Duck-Yong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.193-198
    • /
    • 2018
  • In Korea, the penetration rate of Internet, telephone and smart devices is reaching the highest level in the world. Cyber financial crimes that exploit such infrastructures continue to evolve. Since the first Voice Phishing crime in May 2006, ten years later, there has been a constant occurrence of Voice Phishing crime. Voice Phishing is a crime in which a victim is phoned for false information to figure out the victim's account number and password. This method of Voice Phishing evolves day by day, and it is difficult to investigate. Most of Voice Phishing is a form of international organized crime that is based in Southeast Asia such as China, and it is not easy to eradicate by international cooperation investigation. The purpose of this study is to investigate the actual situation and case analysis of Voice Phishing crime, and to propose the countermeasures against police Voice Phishing counterplan.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

A Study on the Countermeasures of Cyber Crimes Among Nations - Focusing on the Global Governance - (국가간 사이버범죄 대응체제 구축에 관한 연구 - 글로벌 거버넌스적 측면에서 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.307-318
    • /
    • 2005
  • Cyber crimes caused unpredictable damages by influencing targets with means such as hacking and virus in virtual space. In specific, they transcend time and space because of their anonymity and it is difficult to punish the people who are involved in crimes. To manage such cyber crimes, we need an international cooperative systems beyond difference in legal systems between countries and 'Global Governance' was prepared as a reasonable alternative. These days, governance has been presented as an important concept to explain changed social systems or changed roles of government. It was not just a concept to replace traditional government of a single nation, but to overcome new problems on social actions of humans. So it is expected that it can help prepare reasonable measures through cooperation both in individuals and systems, and public and civil sectors. To countermeasure cyber crimes in terms of global governance, we can prepare general investigation systems and professional human resources through civil and public assistance, and provide a base on which international cooperation systems can be established.

  • PDF

Strategies of Storytelling Based Teaching of English Speaking for Novice High Learners (초급 상 수준을 위한 스토리텔링 중심의 영어 말하기 교수 전략)

  • Ko, Mi-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3172-3179
    • /
    • 2015
  • This study suggests one of English teaching methods to improve English speaking proficiency for adult English learners. Contrary to the traditional English conversation teaching trends such as memorization of specific patterns or grammar-focused practices, the study introduces a storytelling based teaching of English speaking. To theoretically support the storytelling based English speaking teaching, the study investigates the possibility of the teaching method in three ways. First, the 12 speaking strategies focusing on contents of a story are introduced in the way of securing speech amounts as much as possible. Next, the five rhetoric components by Aristotle are introduced to relate to the storytelling teaching for the purpose of achieving the goal of speaking, which is to deliver what a speaker want to say more persuasively. Finally, through the investigation of the learner strategy uses, the possibility of storytelling English speaking teaching can be expected regardless of learners' low level of English proficiency.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Analysis on System Log of Huawei Smartphone (화웨이 스마트폰 시스템 로그에 대한 분석)

  • Park, Eunhu;Kim, Soram;Kim, Jongsung
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.9-17
    • /
    • 2018
  • Smartphone have become commonplace because they have the advantage of facilitating communication with others and making life easier. The smartphone's system log stores various data related to the user actions. Since 2015, Huawei has been growing rapidly, with its sales volume increasing and it was ranked second in the world in three years. The use of Huawei smartphones by many users means that Huawei smartphones are likely to be used to detect traces of criminal investigations, so we need to study system logs of Huawei smartphones. Therefore, in this paper, we analyze system log which is forensically meaningful for Huawei smartphone. We also propose how to use logs in forensic investigation.

A Geo-statistical Assessment of Heavy Metal Pollution in the Soil Around a Ship Building Yard in Busan, Korea (통계지표를 활용한 부산지역 조선소 주변 토양 내 중금속 오염조사 연구)

  • Choi, Jung-Sik;Jeon, Soo kyung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.7
    • /
    • pp.907-915
    • /
    • 2018
  • With the increase of metal usage in various industries, metal pollution and ecological toxicity in the environmental system have become a significant concern. A geo-statistical index has been widely used to determine contamination level with normalization through a background value. In this study, geo-statistical indexes such as an enrichment factor, accumulation index, and potential ecological risk index were used to assess metal pollution in soil at locations associated with shipbuilding manufacturing industries. Metal contamination, especially of Cu and Pb, was observed in some samples located closer to manufacturing sites. Enrichment factor and accumulation (IGEO) values were indicative of concerning levels of soil contamination in specific samples, and the soil contamination could be induced by anthropogenic sources. In further study, after more detailed sampling for soil and potential pollution sources, high interpretation techniques such as Pb isotope analysis and X-ray analysis will be needed to investigate source identification.

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.

The Rhetoric of Revelation and the Politics of Prophecy: A Reading of Ginsberg's "Howl" and "Kaddish" (계시의 수사와 정치학-긴즈버그의 「울부짖음」과 「캐디쉬」를 중심으로)

  • Son, Hyesook
    • Journal of English Language & Literature
    • /
    • v.57 no.4
    • /
    • pp.529-552
    • /
    • 2011
  • My essay aims at reading Ginsberg's "Howl" and "Kaddish" with the concept of 'shaman-prophet-poet' to illustrate the dynamic relationship between his poetics and radical politics. Throughout his widely-ranging career, Ginsberg represents himself as a poet-prophet and commands a typical rhetoric of revelation as a way of decentering Cold War orthodoxies. While well aware of the oppressive and pervasive power of the dominant post-war ideologies, he adopts 'madness' to oppose conventional political, social, and religious institutions; by way of entering into the madness of this world and actively engaging himself as a victim, he can finally heal both himself and the world. This dual function of poet characterizes his rhetoric of revelation, but it doesn't appeal to the mainstream of American critical ideology where the post-structural approach to language and subject gives a skeptical look at any account of active human agency and humanistic belief in the possibility of language. In "Howl" and "Kaddish," Ginsburg persuades the reader of the truth of his own vision through the convincing and realistic portraits of his contemporaries as well as his own mother and family. Different from his visionary predecessors such as Emerson and Whitman, Ginsberg knew the difficulty of a negotiation between history and divine vision, and attempted to imbricate his family, friends, and even the larger social and political units within his visionary experience in order to avoid naive idealism, escapism, or solipsism. Furthermore, he deconstructs the Logos of Western prophecy and replaces it with the groundless identity and the nontheistic epistemology of Buddhism, which, in turn, leads to emptying his powerful language of absolutist meaning and prevents his prophecy from becoming re-reified as divine essentialism. Ginsberg's idea of poet and poem revitalizes the skeptical view on language and literary representation of our contemporary critical community which is unwilling to engage the experimental scope of his radical prophecy.