• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.028 seconds

Financial Industry Security: A Qualitative Study for Reducing Internal Fraud in Banking Institutions (금융산업보안: 은행권 내부부정 방지를 위한 질적 연구)

  • Suh, Joon Bae
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.165-185
    • /
    • 2018
  • Because financial industry is closely related to the daily lives of people, internal fraud such as embezzlement by the employees can cause serious damage to the national economy, including credit crunch and contagious bankruptcy, as once demonstrated in the Savings Bank Scandal in 2011. Therefore, the importance of financial industry security is being emphasized and developed into converged security that combines physical, human and cyber security. In this study, to prevent fraud caused by internal employees in Korean financial sector, in-depth semi-structured interviews were conducted with a total of 16 participants including bankers, officials of financial regulators, and security experts, who were in charge of risk management in the industry. The collected data were analyzed at three stratification levels such as individual, organization, and socio-cultural factor. Based on this analysis, policy recommendations were suggested for the development of financial industry security and reducing internal fraud in banking institutions.

Estimation of River Management Discharge in Nakdongriver Basin (낙동강권역 하천관리유량 산정)

  • Han, Manshin;Hong, Sunghun;Lee, Eungu;Park, Jungsool;Choi, Kyuhyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.614-614
    • /
    • 2015
  • 하천수는 하천의 지표면에 흐르거나 하천 바닥에 스며들어 흐르는 물 또는 하천에 저장되어 있는 물을 말하며, 인구의 증가나 산업화로 인하여 물 사용이 증대되고 있는 실정이다. 이에 따라 국가에서는 하천법 제50조에 의거하여 생활 공업 농업 환경개선 발전 주운 등의 용도로 하천수를 사용하려는 자는 국토교통부장관(홍수통제소장)의 허가를 받아야 한다. 우리나라 수문특성상 우기에 집중되어 있는 물을 갈수기에 이용할 수 있도록 분배하고 관리하는 것이 어려운 실정이다. 하천법 제51조에 의하면 하천유지유량은 생활, 공업, 농업, 환경개선, 발전, 주운 등의 하천수 사용을 고려하여 하천의 정상적인 기능과 상태를 유지하기 위한 최소한의 유량을 말하며, 2006년 고시된 낙동강 수계의 하천유지유량은 대부분 국가하천을 기준지점으로 산정되었고, 산정방법은 평균갈수량 13개, 기준갈수량 2개, 하천생태계 2개 지점이다. 또한, 하천관리유량은 하천유지유량과 이수유량의 합으로 산정된다. 본 연구에서는 2013년도 말 기준으로 하천수 사용허가 현황을 정리하였으며, 용도별, 수계별, 행정구역별, 하천등급별로 하천수 사용허가 건수와 허가량을 분석하였다. 낙동강본류를 대상으로 하천시설물을 고려하여 하천관리유량을 산정하였으며, 하천유지유량의 적절성을 검토함으로써 향후 낙동강권역의 물관리방안을 모색하였다. 낙동강본류구간은 하천관리유량이 기준갈수량에 비하여 큰 형태로써 하천관리유량 확보를 위한 노력이 필요한 것으로 나타났으며, 향후 하천수 사용허가 시설물의 회귀율에 대한 실제적인 자료 수집과 함께 정확한 분석을 통한 하천의 회귀유량을 산정하고, 하폐수 방류시설을 고려하여 산정한 결과와 비교하여 보다 정확한 물수지 분석 체계를 확립하여야 할 것이다.

  • PDF

Metaphorical Analysis of Metaphor Expressions in Video Contents focused on film "The truman show(1998)" (영상콘텐츠 속 은유표현의 의미 분석 연구 영화 "트루먼 쇼(1998)"을 중심으로)

  • Wang, shu;Lee, Tae-hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.441-450
    • /
    • 2019
  • The research of this paper is aimed at finding out the meaning of the literary rhetoric technique of metaphor in film, and understanding the difference between metaphor and symbol. It is also worth reference to the study of metaphor in the future. This paper will read the related paper to organize the relevant concepts and look at the classical film repeatedly, and find the expression element of the metaphor in it. Finally, look at Truman Show and analyze it and find a conclusion. Through related research, we have found that metaphor in movies is always built together through various aspects of themes, titles, lines, and plays. It provides clues through the screen and induces the audience to think. Metaphor not only helps improve the movie's content, but it is also the most important feature in the movie to influence the audience and induce thinking.

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

A Study on 'Language-Letter' images and politics of 'écriture' in Kim, Soo-Yung's poems (김수영 시의 '언어-문자' 이미지와 '에크리튀르'의 정치학)

  • Lee, Chan
    • Cross-Cultural Studies
    • /
    • v.26
    • /
    • pp.173-200
    • /
    • 2012
  • This paper examines ${\acute{e}}pist{\acute{e}}m{\grave{e}}$ of ${\acute{e}}criture$ and its politics in Kim, Soo-Yung's poems, focusing on 'language-letter' images such as "speech", "language", "printing type", "letter", "brush", "book" and so on. While the previous papers fail to present the overall framework of analysis on 'language-${\acute{e}}criture$' images and to show political dimensions of discourse analysis, this paper tries to overcome these limitations. It explains images of 'speech' and 'language' on the basis of Heidegger's ontological thought, and analyzes writing-images such as 'type', 'letters' using Derrida's concepts of 'archi-${\acute{e}}criture$' and '${\acute{e}}criture$'. It also gives a new name to multiple images of 'book' in his poems as 'politics of ${\acute{e}}criture$' based on problematic such as Badiou's 'ethics of truths' and Derrida's '${\acute{e}}criture$'.

Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database (인스턴트 메신저 말랑말랑 톡카페 애플리케이션 데이터베이스 복호화 방안 및 분석)

  • Kim, Giyoon;Lee, Jonghyeok;Shin, Sumin;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.541-547
    • /
    • 2019
  • As leakage cases of personal information increase, the concern of personal information protection is also increasing. As a result, most applications encrypt and store sensitive information such as personal information. Especially, in case of instant messengers, it is more difficult to find database where is not encrypted and stored. However, this kind of database encryption acts as anti-forensic from the point of view of digital forensic investigation. In this paper, we analyze database encryption process of MalangMalang Talkcafe application which is one of instant messenger. Based on our analysis, we propose a decryption method and explain the meaningful information collected in the database.

Printer Identification Methods Using Global and Local Feature-Based Deep Learning (전역 및 지역 특징 기반 딥러닝을 이용한 프린터 장치 판별 기술)

  • Lee, Soo-Hyeon;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.1
    • /
    • pp.37-44
    • /
    • 2019
  • With the advance of digital IT technology, the performance of the printing and scanning devices is improved and their price becomes cheaper. As a result, the public can easily access these devices for crimes such as forgery of official and private documents. Therefore, if we can identify which printing device is used to print the documents, it would help to narrow the investigation and identify suspects. In this paper, we propose a deep learning model for printer identification. A convolutional neural network model based on local features which is widely used for identification in recent is presented. Then, another model including a step to calculate global features and hence improving the convergence speed and accuracy is presented. Using 8 printer models, the performance of the presented models was compared with previous feature-based identification methods. Experimental results show that the presented model using local feature and global feature achieved 97.23% and 99.98% accuracy respectively, which is much better than other previous methods in accuracy.

Dual-purpose Reagent for Separating Paper with Tape and Developing Fingerprints on the Paper Simultaneously (종이에 부착된 테이프를 박리하는 동시에 지문을 현출하는 이중목적시약(dual-purpose)에 관한 연구)

  • Seo, Youn-Hee;Kim, Yeon-Ji;Shin, Min-Seop;Yu, Je-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.463-471
    • /
    • 2019
  • Tapes are usually used in violent crimes and may contain important evidence. Separating adhesive side should be preceded to collect these evidence. In this study, we researched a novel dual-purpose reagent that can separate the tape without damaging and develop the fingerprints on porous surface when the tape is attached to A4 paper. As a result, the reagent of 1:2 ratio of 1,2-IND stock solution and HFE-7100 can separate without damaging the adhesive surface and develop fingerprints on separated A4 paper.