• Title/Summary/Keyword: 범죄발달

Search Result 100, Processing Time 0.023 seconds

The Factors That Cause Customer Satisfaction in Private Security Service: Comparison between Corporate Clients and Individual Clients (민간경비 서비스의 고객 만족도에 영향을 미치는 요인: 사업자고객과 개인고객의 비교)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.161-184
    • /
    • 2013
  • The purpose of this research is to achieve qualitative growth for private security industry as a sector of service industry to attract clients and promote the growth of the private security industry by analyzing the factors which influence the customer's service satisfaction in using the private security services. A regression analysis was conducted to determine the factors which influences the satisfaction of private security service to ultimately achieve the research purpose. In the regression analysis, the difference between corporate clients and individual clients were analyzed for the sake of providing better security services and marketing applications. As a result, the factors that influences the satisfaction of the categorized groups were very clearly signified. Both individual and corporate clients showed increase in satisfaction rate when the fear of crime decreased. This result implies that the private security firms must possess segmented strategies as well as strategies to lower the fear factors of clients. There were no differences in all satisfaction-influencing factors when the fear reduction variable was exempted among both corporate and individual clients in usage satisfaction. This result shows that clients demand varies according to the client and the security firms must react to these demands by the clients. Although private security industry possess very clear publicity, it is a profit generating industry sector therefore, like other service industry, the private security services must implement strategies to keep up with the paradigm. If the satisfaction determinants from the research results are grafted into strategies such relationship marketing and target market selection, higher service satisfaction can be achieved from the clients.

  • PDF

An Evolutionary Concept Analysis of Helicopter Parenting (헬리콥터 양육에 대한 진화론적 개념분석)

  • Lee, Yong-Wha;Kim, Ji-Hyun;Yim, So-Youn;Chae, Myung-Ock;Lee, Hye-Rim;Oh, Jina
    • Child Health Nursing Research
    • /
    • v.20 no.4
    • /
    • pp.237-246
    • /
    • 2014
  • Purpose: Helicopter parenting is an emerging concept as a way of rearing adolescents and adult children. However, helicopter parenting from a nursing perspective has not been elucidated. Therefore, we undertook a concept analysis to understand the attributes, antecedents and consequences of helicopter parenting in the context of nursing. Methods: Using Rodgers' evolutionary concept analysis, we analyzed literature on helicopter parenting to discover critical attributes, antecedents, and consequences of this phenomenon. Data were collected from seven electronic search engines. Twelve studies matching inclusion criteria were reviewed. Results: Three core attributes of helicopter parenting were hovering, highly deep involvement, and proxy decision making. The antecedents and consequences were retrieved from three important domains including social, parent, and child aspects. Surrogate terms were black hawk, hummingbird, and hovercraft parenting, and related terms were stealth fighter and Kamikaze parenting. Conclusion: Based on the results of this study, helicopter parenting has both positive and negative effects on both children and parents. To enhance the positive effects, measurement tools for helicopter parenting and nursing interventions on parenting need to be developed.

A Study on the Industrial Security Policies in Germany (독일의 산업보안 정책과 시사점)

  • Lee, Sung-Yong
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.57-82
    • /
    • 2014
  • The purpose of this paper is to introduce the industrial security policies in Germany and to look for the implication for the development of korean industrial security. Due to highly developed economy and industrial technology, Germany has become the main stage for the industrial espionage for a long time. In Germany industrial espionage is classified into two categories; Economy-espionage and Competition-espionage. While economy-espionage is related to the Espionage of foreign intelligence agencies, Competition-espionage means the act of espionage, that is implemented by the private sector. When it comes to economy-espionage, prevention of economy-espionage is the duty of the State, because it threat the national interest. Otherwise, the private sector has to take the responsibility of prevention of competition-espionage. It goes without saying that, the state has to investigate the crime, when espionage happens. But Prevention is more important than investigation in this regard. For the realization of Public-Private-Partnership, the private sector should be the genuine counterpart of the Public through the sharing responsibility of industrial-espionage prevention. Another talking point this paper suggest, is the national ethic in connection with economy-espionage. The State could be not only a actor of espionage prevention, but also a perpetrator. The economy-espionage for the purpose of national interest would not be justified, unless it has nothing to do with national security.

  • PDF

The study of relationship of Security Service Company's Market Orientation and Business Performance (시큐리티기업의 시장지향성과 경영성과의 관계 연구)

  • Park, Ki-Beom
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.109-129
    • /
    • 2008
  • The purpose of this study is to analyze the relationship of market orientation, and business performance in the security firms. To achieve the goal of the study, it has used various methods to study. First of all, it has carried out documentary surveys through literatures review on market orientation and business performance of the security firms, and practical researches side by side. In the documentary surveys, it has developed the framework of study and questionnaires based on the domestic and foreign books, theses, materials of public institutions, and other materials. In the practical researches, basing on the selected study models and hypotheses, it has selected 15 security companies which are located in Seoul, Gyeonggi and Chungcheong Provinces with the stratified cluster random sampling method. It has polled the employees of the security companies for about 2 months from 5 August to 10 October 2006, distributing 20$\sim$50 pieces per company. It has distributed 600 pieces and used 565 pieces for analysis excepting unfaithful 35 pieces. The collected questionnaires were analyzed by SPSSWIN 14.0 program. and The methods to analyze the materials were factor analysis, reliability analysis, correlation analysis, multiple regression analysis, and path analysis through regression analysis. The results obtained from the study using analysis methods above are as follows. Finally, market orientation influences on business performance. In other words, the higher market orientation is, the better financial and non financial outcomes are.

  • PDF

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Practitioners' Needs Analysis to Improve the Youth Theft Prevention Program (청소년 절도비행 재범방지 프로그램 개선을 위한 실무자 요구조사 연구)

  • Choi, Jaegwang;Jang, Heamin;Lee, Yu-Kyeong;Song, Wonyoung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.145-156
    • /
    • 2021
  • This study is aimed to improve the youth theft prevention program with rationality and practicality, based on the needs of practitioners who conduct these programs in fields. The survey questionnaire was prepared based on previous researches, and the survey was conducted on 72 probation officers and education instructors nationwide running a youth theft prevention program. As a result, practitioners reported the lack of self-control and high impulsivity as the main characteristics of the theft delinquent adolescents. And they recognized peer alignment and family problems as the causes of theft. As for the contents of the program, they reported that recidivism prevention skills such as understanding psychological problems, peer relationships, raising a sense of law compliance, anger, impulse control, dealing with negative emotions, and finding alternative behaviors, as well as moral development, are necessary. These results indicate that multi-dimensional interventions such as individuals, families, and peers are needed to prevent recidivism of juvenile theft. Implications of these results, future research directions, and limitations and significance of the study were discussed.

A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information (RGB-D 정보를 이용한 2차원 키포인트 탐지 기반 3차원 인간 자세 추정 방법)

  • Park, Seohee;Ji, Myunggeun;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.41-51
    • /
    • 2018
  • Recently, in the field of video surveillance, deep learning based learning method is applied to intelligent video surveillance system, and various events such as crime, fire, and abnormal phenomenon can be robustly detected. However, since occlusion occurs due to the loss of 3d information generated by projecting the 3d real-world in 2d image, it is need to consider the occlusion problem in order to accurately detect the object and to estimate the pose. Therefore, in this paper, we detect moving objects by solving the occlusion problem of object detection process by adding depth information to existing RGB information. Then, using the convolution neural network in the detected region, the positions of the 14 keypoints of the human joint region can be predicted. Finally, in order to solve the self-occlusion problem occurring in the pose estimation process, the method for 3d human pose estimation is described by extending the range of estimation to the 3d space using the predicted result of 2d keypoint and the deep neural network. In the future, the result of 2d and 3d pose estimation of this research can be used as easy data for future human behavior recognition and contribute to the development of industrial technology.

The Effect of Involvement and Severity on Acceptance of Artificial Intelligence Judgment (사건 관여도와 심각성이 인공지능 판결에 대한 수용도에 미치는 효과)

  • Doh, Eun Yeong;Lee, Guk-Hee;Jung, Ji Eun
    • Korean Journal of Cognitive Science
    • /
    • v.32 no.4
    • /
    • pp.169-191
    • /
    • 2021
  • With the development of artificial intelligence(AI), the jobs of many human experts are threatened, and this also applies to the legal profession. This study attempted to investigate whether AI can actually replace humans in the legal profession, especially the role of judges making final judgments. For this purpose, from the perspective of uniqueness neglect, this study was conducted to confirm the effect of involvement and the severity on acceptance of the judgment made by the AI judge (Experiment 1) and the AI jury (Experiment 2). The involvement was manipulated as if the subject who was sentenced for committing a crime was his or her family (mother, father) or stranger, and the severity was manipulated by the extent of the damage, the perception of the crime, and the number of applied crimes. In Experiment 1, the interactive effect of involvement and severity was found. Specifically, when the involvement was low, the acceptance of AI judges was higher in high severity (vs. low severity). Conversely, when the involvement was high, the acceptance of AI judges was higher in low severity (vs. high severity). The same interactions as in Experiment 1 occurred in Experiment 2. Specifically, when the involvement was low, a larger number of AI jury members were allocated in high severity (vs. low severity). On the other hand, when the involvement was high, the number of AI juries increased in low severity (vs. high severity). This study has implications in that it is the first experimental study in Korea on artificial intelligence legal judgment and that it presents the prospects for the jobs of legal experts.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

The Hague Convention on Jurisdiction and Enforcement, of Judgments

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.16 no.1
    • /
    • pp.343-373
    • /
    • 2006
  • 지적재산권의 속지주의 원칙에 따라 전통적으로 지적재산권의 침해에 있어서 결과의 발생이 없는 행위지를 침해지로 인정하지 않았다. 어문과 예술작품을 보호하기 위해 1886년 체결된 베른협약(Berne Convention for the Protection of Literary and Artistic Works) 제5조 제1항은 저작자가 베른협약에 따라 보호되는 저작물에 관하여 본국 이외의 동맹국에서 각 법률이 현재 또는 장래에 자국민에게 부여하는 권리 및 이 협약이 특별히 부여하는 권리를 향유한다고 규정하여 내국민대우원칙을 천명하고 있다. 또한 베른협약 제5조 제2항은 저작권의 보호와 향유는 저작물의 본국에서 보호가 존재하는 여부와 관계가 없이, 보호의 범위와 저작자의 권리를 보호하기 위하여 주어지는 구제의 방법은 오로지 보호가 주장되는 국가의 법률의 지배를 받는다라고 규정하여 저작권 침해가 발행한 국가의 법률의 적용을 명시하고 있다. 인터넷과 무선통신 기술의 발달은 저작물을 디지탈 형식으로 실시간에 전세계에 배포하는 것을 가능하게 하였다. 특히 저작물의 인터넷상에서의 배포는 다국적 저작권 침해행위를 야기하여, 저작권자가 다수의 국가에서 저작권 침해소송을 제기하여 판결을 집행하는 것이 필요하게 되었다. 헤이그국제사법회의(Hague Conference on Private International Law)에서 1992년부터 논의되어 온 민사 및 상사사건의 국제재판관할과 외국판결에 관한 협약(Convention on Jurisdiction and Foreign Judgment in Civil and Commercial Matters)에서 채택된1999년의 예비초안(preliminary draft) 및 2001년 외교회의에서 수정된 잠정초안(Interim text) (이하 헤이그 협약 )은 저작권자가 저작권침해행위가 발생한 각 국가에서 저작권 침해행위를 금지하는 소송을 제기할 필요없이, 동 협약의 한 가맹국가의 법원의 저작권침해금지판결을 다른 가맹국가에서도 집행할 수 있는 가능성을 제시해 주는데 의미가 있다. 헤이그 협약 제10조는 불법행위(torts)에 관한 일반적인 재판관할에 관한 규정을 두고 있으며, 저작권침해에 관한 분쟁은 동 조항의 적용을 받는다. 제10조에 의해 당사자는 가해행위지 국가의 법원 또는 결과발생지 국가의 법원에서 소송을 제기할 수 있다. 결과발생지의 경우 제10조 1항 (b)는 피고가 자신의 행위가 본국의 법규에 비추어 동일한 성격의 손해를 초래할 수 있다라고 합리적으로 예견할 수 없었던 경우에 본 조항의 적용을 배제하고 있다. 인터넷을 통한 저작권침해의 경우, 피고가 자신의 국가의 법규하에서 합법적으로 저작물을 웹사이트에 게시하였으나, 그 행위가 다운로딩이 행해진 국가에서 불법인 경우, 피고는 저작권침해를 예견할 수 없었으므로 이에 문제가 제기된다. iCrave TV사건에서, 피고인 캐나다회사가 미국 및 캐나다에서 방송되는 텔레비젼 방송 프로그램을 자신의 웹사이트에 게시하여 이용자들로 하여금 컴퓨터를 통하여 방송을 재시청 할 수 있도록 하였는데 이는 캐나다에서 합법인 반면에 미국에서는 저작권 침해에 해당한다. 피고는 방송 프로그램을 인터넷상에서 재방송하는 것은 캐나다법상 합법이므로 저작권침해를 예견할 수 없었다고 주장하면서, 해당 사이트에 오직 캐나다 거주자만의 접속을 허용하고 미국 거주자의 접속을 제한하는 일련의 Click-Wrap 계약과 스크린 장치를 제공하였다고 주장하였다. 본 사건 피고의 주장을 받아들인다고 가정할 때, 제10조 1항(b)에 의해 원고는 결과발생지인 미국법원의 재판관할을 강제할 수 없을 것이다. 지적재산권을 둘러싼 분쟁에 관한 재판관할과 국제법상의 판결의 승인 및 집행의 통일성을 기하기 위하여 2001년 1월 세계지적재산권기구(World Intellectual Property Organization)가 제안한 WIPO 협약초안(Draft Convention on Jurisdiction and Recognition of Judgments in Intellectual Property Matters)은 헤이그 협약이 재판관할과 판결의 승인 및 집행에 대한 일반적인 접근을 하고 있는 점에 반하여 지적재산권자의 보호라는 측면을 고려하여 지적재산권침해소송에 국제재판관할권을 규정하고 있다. WIPO 협약초안 제6조는 저작권자가 저작권 침해를 막기 위한 합리적인 조치를 취한 국가에서 저작권 침해소송을 피할 수 있다고 규정하고 있다. 따라서 본 조항에 의할 경우, iCrave TV사건의 피고는 미국에서의 저작권 침해소송을 회피할 수 있을 것이다. 이상과 같이 헤이그 협약이 외국판결의 승인 및 집행을 가능하게 하고 있음에도 불구하고, 외국법원의 판결이 다수의 가맹국가에서 집행되지 못하는 가장 큰 장애는 대다수의 국가들이 외국법원의 판결이 공서양속(Public Policy)에 반하는 경우 판결을 승인하지 않는 예외규정을 두고 있기 때문이다. 미국의 경우, Uniform Recognition Act와 Restatement(Third) of Foreign Relations에 따른 공서양속의 예외규정(Public Policy exception)은 외국법원의 판결의 승인을 부인하는 근거가 된다. Yahoo! 사건에서 Yahoo! Inc.의 옥션 사이트를 통해 독일 나치 소장물의 판매가 이루어졌는데, 프랑스 형법상 이는 범죄행위에 해당하므로, 프랑스 법원은Yahoo! Inc.에게 프랑스 이용자가 당해 옥션 사이트에 접속할 수 없도록 모든 가능한 조치를 취할 것을 명하였다. 이에 미국 법원은 프랑스 법원의 판결은 Yahoo! Inc.의 미국헌법 제1 수정(First Amendment)의 언론의 자유(freedom of speech)에 반하므로 판결의 집행을 거부하였는데 이는 공서양속의 예외규정을 보여주는 예이다. 헤이그 협약 제28조와 WIPO 협약초안 제25조 또한 공서양속의 예외규정을 두고 있다. 본 논문은 인터넷과 통신기술의 발달로 야기되는 다국적 저작권 침해사건에서 한 국가의 법원의 저작권 침해금지판결이 다수의 국가에서 승인 및 집행될 수 있는 능성을 헤이그 협약과 WIPO 협약초안 및 미국판결을 중심으로 살펴보았다. 국제적으로 통일된 저작권법이 존재하지 않고 외국 판결의 승인을 부인하는 예외조항과 외국판결의 집행에 관한 각국의 이해관계와 준거법의 해석이 다른 현시점에서 지적재산권의 속지주의를 뛰어넘어 외국법원의 판결을 국제적으로 집행하는 것은 다소 어려움이 있어 보이나 국제적인 집행가능성의 열쇠를 제시하는 헤이그 협약과 장래의 국제조약에 그 기대를 걸어볼 수 있겠다.

  • PDF