• Title/Summary/Keyword: 범죄사고

Search Result 191, Processing Time 0.02 seconds

The Legal Study of Prohibited Items on Aeroplane for the Aircraft Safety and Security (항공안전보장.질서유지를 위한 항공기반입금지 물품 관리.감독에 관한 입법적 개선방안)

  • Chang, In-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.33-66
    • /
    • 2014
  • While the numbers of overseas travelers has been increased rapidly each year, the numbers of passengers in the aircraft also has continued to be increased gradually. In the mist of these increasing numbers, such accidents as threatening an aircraft safety like riot, aircraft hijacking and terrorism have happened constantly. In these circumstances, South Korean government has prescribed "Aviation on Security Act" in accordance with the Convention on International Civil Aviation and other international agreements. This act aims to prevent illegal activities and illegal items on the aircraft to ensure the safety and security of civil aviation. However, this act is not sufficiently regulating all the illegal crimes and illegal items on the flight. For the worse, there is a lack of effective supervisory capacity. Likewise, the inherent problems of the current laws relating to the prevention of the illegal items on the aircraft are appearing on the surface continually. Above all, illegal items on the aircraft are directly connected to the issue of aviation safety and security as well as a safe utilization of the flight service. Thus, when there occurs a serious accident on board, it surely would be led to a huge economic loss not mentioning the loss of lives following the accident. Therefore safety of the flight passengers cannot be guaranteed without ensuring the safety of aircraft facilities and good supervisory mechanism of illegal items on the aircraft. Accordingly, establishing a safe operation order tends to influence economy and tourism of a country in no small measure. Therefore, it is an urgent issue to settle down a reasonable and adequate supervisory regulations regarding the prevention of the illegal items on the aircraft. Consequently, in this article, I studied on a reasonal and effective mechanism to control the prevention of the illegal items and illegal acts on the aircraft in order to ensure a safety and security of civil aircraft.

A Study on Port's Influence over 'Quality of Life' in Sea Port Cities - Compare China Dalian Port with Busan Port - (해항도시의 삶의 질에 대한 항만의 영향력 분석 - 중국 대련항과 부산항의 비교분석 -)

  • Kim, Sang-Goo
    • Journal of Navigation and Port Research
    • /
    • v.36 no.6
    • /
    • pp.481-488
    • /
    • 2012
  • As an exploratory research to understand the nature of relationships between ports and their neighboring communities, this study analyzes how ports influence their residents' quality of life(QOL). The QOL was measured by 17 indicators reconstructed by reviewing relevant literatures. As a result, both Busan port and Dalian port were found to have statistically significant influence on many of QOL indicators including general expenditure per capita, number of manufacturing factories per capita, number of factories's laborer per capita, the rate of pavement, number of traffic accident per capita, rate of housing supply, number of financial agencies per capita, park area per capita, number of cultural assets per capita, the size of welfare expenditure per capita, number of fire occurrence per capita. And Busan port have statistically significant influence on QOL indicators including the rate of increase in population, number of public health industries per capita, number of public health industries per capita, number of schools per capita, number of sick-beds per capita, but Dalian port not have influence. Also Dalian port have statistically significant influence on number of crime occurrence per capita, but Busan port not have influence.

The Influence of Private Security Guard's Stress Coping on Job Burnout (민간경비원의 스트레스 대처방식이 직무소진에 미치는 영향)

  • Lee, Man-Jong;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.209-232
    • /
    • 2013
  • As time goes by, the diversity of crime has become a serious social problem in modern society, and the policing is increasing the role of private security guards in order to fill the policing. But Private guards stressful experience to perform the actual work is exposed to various crisis situations. Then, private security guards should be management because of private security impact on job burnout. This study aims to determine the empirical work experience in the field of private security guards to cope with stress according to the degree of job burnout. The results are as follows: First, it was the negative effects of the stress coping strategies of private security guards on physical and psychological burnout, and the statistic effects of the wishes coping strategies of private security guards on physical and psychological burnout. Second, stress coping strategies of private security guards, were not found to affect the dehumanization of job burnout. Third, the center of the problem of private security guards of the ways to cope with stress coping was lacking in a static(+) affecting the accomplishment of the job burnout. Therefore, the different types of stress that may arise private security guards physically exhausted, psychologically exhausted, lack of accomplishment in the course of the private security business perform. Finally, Managers of the private security guards, job burnout occurs should be focused on the factors pre-management and co-ordination.

  • PDF

A Factor Analysis on Resident's Satisfaction of the Efficient Rural Development Projects: Focusing on the Rural Development Projects under the Block Grants System in Buyeo (효율적인 농산어촌지역개발사업을 위한 주민만족요인분석 -부여군 포괄보조금제도하에 지역개발사업을 중심으로-)

  • Yoon, Jun Sang;Park, Eun Byong
    • Journal of Agricultural Extension & Community Development
    • /
    • v.19 no.4
    • /
    • pp.773-798
    • /
    • 2012
  • The study present the findings divide into brand naming, image, positioning. The farms built trust by consumer relationship with the farm brand. The results of the study provide insights for agricultural marketers who intend to design brand stories that align with their produce. This study is a regional case study of the factor analysis which explain residents' satisfaction of the efficient rural development projects under the Block Grants System in Buyeo. This study attempted to proceed the empirical survey of 353 residents who live in one 'town(eup)' and 13 'village(meon)' in Buyeo-gun and analyzed through SPSSWIN. The results of the satisfaction analysis in the local development projects satisfied with the overall average 3.16 and then empirically verified the important factors of the 'cultural and leisure activities', 'learning environment', 'jobs and working conditions', 'transportation'. The factor analysis of 12 variables united into three factors, the first Factors are 'transportation', 'learning environment', 'social welfare', 'cultural and leisure activities', 'Information and Communication', 'Health and Medical Services'. The second factors are 'crimes and accidents', 'environmental management', 'neighbor relations and social participation', and the third factors united into 'income and consumption activities', 'job creation' which imply the economic variables, and 'residential environment' as the common category.

A Web-based System for Real-time Monitoring of Dangerous Objects using RFID (RFID를 이용한 웹 기반의 실시간 위험물 모니터링 시스템 구축 사례)

  • Kim, Ju-Il;Lee, Woo-Jin;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.101-115
    • /
    • 2008
  • Recently in the human society, the crime using small arms has increased. Also, many accidents happen because of incomplete management of chemicals and radiation. Accordingly, it is necessary to manage dangerous objects by tracing the position of dangerous objects and rapidly providing the correct information for them. This paper presents a web-based system for real-time monitoring of dangerous objects using RFID in order to overcome the limitations and problems of current dangerous objects management techniques. In this paper, we define the architecture for web-based dangerous objects monitoring system and the scheme for storing information of a dangerous object in the RFID tag. We also implement the web-based monitoring system and present the execution result of the system. The proposed real-time monitoring system is composed of the dangerous objects monitoring server which manages information of dangerous objects and controls them, the dangerous objects monitoring middleware which is mediator between dangerous objects and the server, the RFID reader which reads information of dangerous objects from RFID tags attached to the objects and the database which stores information, status and position of dangerous object. The proposed system manages diverse dangerous objects such as small arms, radiation and harmful chemicals based on the position of them using RFID, so the user can check dangerous objects when they are checked in and checked out and the user can acquire the real-time position information of them through the system. Furthermore, the user can visually monitor dangerous objects through web browser from any where and at any time because the system is web-based system and it provides graphical user interface.

  • PDF

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

A Study on the Type of Litigation through Analysis of Landscape Precedent (조경 판례분석을 통한 소송의 유형화 연구)

  • Park, Hyun-Bin;Kim, Dong-Pil;Moon, Ho-Kyung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.48 no.4
    • /
    • pp.8-18
    • /
    • 2020
  • This study selected landscaping-related precedents among Supreme Court decisions to which the Basic Construction Industry Act and Civil Litigation Act were applied, and divided them by year, by sector type, and by litigation type according to the cause of the litigation, and examined time-series trends and the main characteristics of landscaping-related litigation. As a result of the analysis by year, it became apparent that litigation cases began to appear in earnest in 1977, similar to when landscape licenses were first issued. The types according to the cause of the litigation were analyzed by dividing them into 'planning', 'construction', and 'management'. Among them, 'planning' was the most frequently identified (409 cases). Various precedents were searched according to 'construction', and some of them were found to be due to unclear legal standards related to landscaping. In 'management', cases such as safety accidents and crimes were considered. The users, legal definitions, and purposes of the space served as the basis for judgments. As a result of analysis by case type, there were many administrative landscaping-related cases, and the proportion of criminal cases in the management type was the highest. The results of this study looked at precedents across the entire landscape industry, and it was significant that it provides basic data that could be used by the general public as that they were categorized by field. In the future, amendments to the law and various studies should be conducted to reduce and resolve disputes, and it is necessary to expand the publicity of precedents for this purpose.

Effects and Limitations of Separating Overlapped Fingerprints Using Fast Fourier Transform (고속 푸리에 변환(fast Fourier transform, FFT)을 이용한 겹친지문 분리의 효과와 한계)

  • Kim, Chaewon;Kim, Chaelin;Lee, Hanna;Yu, Jeseol;Jang, Yunsik
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.377-400
    • /
    • 2019
  • Photography is the most commonly used method of documenting the crime and incident scene as it helps maintaining chain of custody (COC) and prove integrity of the physical evidence. It can also capture phenomena as they are. However, digital images can be manipulated and lose their authenticity as admissible evidence. Thus only limited techniques can be used to enhance images, and one of them is Fourier transform. Fourier transform refers to transformation of images into frequency signals. Fast Fourier transform (FFT) is used in this study. In this experiment, we overlapped fingerprints with graph paper or other fingerprints and separated the fingerprints. Then we evaluated and compared quality of the separated fingerprints to the original fingerprints, and examined whether the two fingerprints can be identified as same fingerprints. In the case of the fingerprints on graph paper and general pattern-overlapping fingerprints, fingerprint ridges are enhanced. On the other hand, in case of separating complicated fingerprints such as core-to-core overlapping and delta-to-delta overlapping fingerprints, quality of fingerprints can be deteriorated. Quality of fingerprints is known to possibly bring negative effects on the credibility of examiners. The result of this study may be applicable to other areas using digital imaging enhancement technology.

Analysis of related words for each private security service through collection of unstructured data

  • Park, Su-Hyeon;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.219-224
    • /
    • 2020
  • The purpose of this study is mainly to provide theoretical basis of private security industry by analyzing the perception and flow of private security from the press-released materials according to periodic classification and duties through 'Big Kinds', a website of analyzing news big data. The research method has been changed to structured data to allow an analysis of various scattered unstructured data, and the keywords trend and related words by duties of private security were analyzed in growth period of private security. The perception of private security based on the results of the study was exposed a lot by the media through various crimes, accidents and incidents, and the issues related permanent position. Also, it tended to be perceived as a simple security guard, not recognized as the area of private security, and judging from the high correlation between private security and police, it was recognized not only as a role to assist the police force, but also as a common agent in charge of the public peace. Therefore, it should objectively judge the perception of private security, and through this, it is believed that it should be a foundation for recognizing private security as a main agent responsible for the safety of the nation and maintaining social orders.