• Title/Summary/Keyword: 범죄시나리오

Search Result 25, Processing Time 0.216 seconds

A Study on the Characteristics and Progress of New Voice Phishing Based on Psychological Descriptions (심리적 기재를 기반으로 한 신종 보이스피싱의 특성 및 진행과정에 관한 연구)

  • SeiYouen Oh;HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.510-518
    • /
    • 2023
  • Purpose: This study compares and analyzes the characteristics and progress of existing voice phishing and new voice phishing to present a basic policy plan to prepare countermeasures against new voice phishing based on psychological descriptions. Method: The criminal progress and characteristics of the two were compared and analyzed through damage cases on various portal sites centered on voice phishing crime scenarios. Result: As a result of analyzing the progress of the third stage of new voice phishing, the scenario of new voice phishing that can deceive victims was written more carefully and the scope of the crime was expanded. In the crime execution stage, the victim was socially isolated, reducing the victim's judgment ability, making it more difficult for investigative agencies to investigate, and in the final stage, the continuity and expansion of criminal damage such as extortion of money and valuables are shown. Conclusion: There were differences in the target and scope of the crime and the method of the crime strategy between the two, and the possibility of damage is much greater, so a more efficient response strategy should be prepared.

Web Log Scenario Make for Forensic (포렌식을 위한 웹로그 시나리오 작성 시스템)

  • Jang, Hae-Sook;Lee, Jin-Kwan;Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.303-305
    • /
    • 2011
  • 수많은 웹로그 히스토리의 자료에서 컴퓨터 사이버범죄에 대한 증거자료로 채택되기 위한 기술적인 웹 포렌식 자료의 추출에 사용되는 웹 포렌식 알고리즘은 필수적인 요소이다. 본 논문에서는 웹 로그 시나리오 작성을 제안하고 설계하여, 웹 포렌식을 통한 컴퓨터 사이버범죄에 대한 학문적 기술적 발전에 기여하고자 하는데 본 논문의 목적이 있다. 수많은 웹로그 자료에서 컴퓨터 사이버 범죄에 대한 증거 자료로 채택되기 위한 기술적인 웹 포렌식 자료의 추출에 사용되는 웹 로그 분석 알고리즘은 필수적인 요소이다. 본 논문에서는 웹 포렌식 알고리즘을 제안하고 설계하여, 실제 기업의 웹 서버 시스템에 제안한 알고리즘을 구현해 본다. 웹 서버에서 웹 로그 분석을 위해 사용한 웹 포렌식 알고리즘과 플로우를 설계하고 코딩을 통한 구현을 한다. 구현 결과 웹 포렌식을 통한 컴퓨터 사이버 범죄에 대한 학문적 기술적 발전에 기여하고자 하는데 본 논문의 목적이 있다.

  • PDF

Predicting Crime Risky Area Using Machine Learning (머신러닝기반 범죄발생 위험지역 예측)

  • HEO, Sun-Young;KIM, Ju-Young;MOON, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.64-80
    • /
    • 2018
  • In Korea, citizens can only know general information about crime. Thus it is difficult to know how much they are exposed to crime. If the police can predict the crime risky area, it will be possible to cope with the crime efficiently even though insufficient police and enforcement resources. However, there is no prediction system in Korea and the related researches are very much poor. From these backgrounds, the final goal of this study is to develop an automated crime prediction system. However, for the first step, we build a big data set which consists of local real crime information and urban physical or non-physical data. Then, we developed a crime prediction model through machine learning method. Finally, we assumed several possible scenarios and calculated the probability of crime and visualized the results in a map so as to increase the people's understanding. Among the factors affecting the crime occurrence revealed in previous and case studies, data was processed in the form of a big data for machine learning: real crime information, weather information (temperature, rainfall, wind speed, humidity, sunshine, insolation, snowfall, cloud cover) and local information (average building coverage, average floor area ratio, average building height, number of buildings, average appraised land value, average area of residential building, average number of ground floor). Among the supervised machine learning algorithms, the decision tree model, the random forest model, and the SVM model, which are known to be powerful and accurate in various fields were utilized to construct crime prevention model. As a result, decision tree model with the lowest RMSE was selected as an optimal prediction model. Based on this model, several scenarios were set for theft and violence cases which are the most frequent in the case city J, and the probability of crime was estimated by $250{\times}250m$ grid. As a result, we could find that the high crime risky area is occurring in three patterns in case city J. The probability of crime was divided into three classes and visualized in map by $250{\times}250m$ grid. Finally, we could develop a crime prediction model using machine learning algorithm and visualized the crime risky areas in a map which can recalculate the model and visualize the result simultaneously as time and urban conditions change.

The Role of Counterfactual Thinking in Media's Criminogenic Effects: Criminal Intent with the Mutability of Punishment Consequences (미디어의 범죄유발 효과에 있어서 사후가정사고의 역할: 처벌결과의 전환성에 따른 범죄의도)

  • Sangyeon Yoon;Di Zhang;Taekyun Hur
    • Korean Journal of Culture and Social Issue
    • /
    • v.18 no.3
    • /
    • pp.329-347
    • /
    • 2012
  • Criminal media such as dramas and movies are growing in popularity. However, the effects of criminal media as well as its psychological mechanism are not clearly examined. Based on social learning theory (Bandura, 1978), past studies showed that arrest and punishment to the criminal in media have a suppressing effect. The present research examined the ironic possibility that media coverage of punishment could increase the audience's criminal intention and proposed the mediating role of counterfactual thinking in the effect. We hypothesized that when punishment was depicted as accidental rather than unavoidable in media coverage, perceived high mutability and counterfactuals focusing on the accidental factors could clarify the ways to commit the crime without being caught and subsequently increase future criminal intention. In this study, 95 college students read a story of plagiarizing either no, accidental, or inevitable punishment, and later asked to report their intention to plagiarize. An ANCOVA with participants' own history of plagiarism as a covariate found that the intention of plagiarism in future was significantly different. The results showed that the intention of plagiarism in the accidental punishment condition was higher than that in the inevitable punishment condition. Further, the intention of plagiarism in the accidental punishment condition was the same level with non-punishment condition. The findings suggest that whether criminals are caught or not is not enough to reduce criminal intentions of audience, but how criminals are caught matters.

The Effects of Financial Pressure and Tit for tat Strategy on Decision Making in White-collar crime (재정적 압박과 전략정보 유무가 화이트칼라 범죄 의사결정에 미치는 영향)

  • Hong, Donggyu;Jo, Eunkyung
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.2
    • /
    • pp.199-221
    • /
    • 2021
  • The purpose of this study is to examine some factors affecting the decision-making process of white-collar crime. In a between-subject experiment, 102 adult white-collar workers were randomly assigned to a financial pressure condition or tit for tat strategy condition. Participants went through a decision-making process in a modified iterated prisoner's dilemma for a white-collar crime scenario to earn points. The obtained score indicated the risk of committing a crime. The lower the score, the higher was the risk of participating in a crime. The results showed that participants who received only tit for tat strategy information without financial pressure instructions showed the lowest risk of participating in a crime, and those who received only financial pressure without the strategic information had the highest risk of participating in a crime. In addition, those who received the financial pressure instructions were more likely to participate in a crime than those who did not receive financial pressure instructions regardless of the provision of strategic information. The results of this study propose the need for measures to legally relieve financial pressure, the need for education on white-collar crimes for office workers, and the need for a decision-making structure within the enterprise that is not dogmatic but cooperative and mutually verifiable.

A study on the Comparison Analysis for Messenger Evidence Using Mobile Forensics (모바일 포렌식을 이용한 메신저 증거 비교 분석 연구)

  • Hwang, Taejin;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.25-32
    • /
    • 2018
  • As the use of smartphones become more common, the communication via instant messenger becomes natural. However, it is important to secure the relevant information promptly since the chat room between participants can be used as a space for a criminal conspiracy, and crime-related contents can be stored and deleted easily on smartphones. Therefore, this study aims to identify the available data and to use it as proof by comparing and analyzing the instant messengers with high usage rate.

  • PDF

Road Networks and Crime Occurrence Multi-Agent Simulation for Smart Safe City (스마트 안전도시 조성을 위한 도로망 특성과 범죄발생 멀티에이전트(Multi-Agent) 시뮬레이션)

  • MOON, Tae-Heon;CHO, Jung-Hun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.120-134
    • /
    • 2015
  • Under the hypothesis that the form of road network could affect crime occurrence, this study demonstrates to prove them using Space Syntax with real crime data. We calculated integration, control, connection index by means of Space Syntax and analyzed the relationship between the three indexes and the number of crime occurrence on the each road. Next, in order to generalize the analysis results we adopted Multi-Agent Model and simulated several scenarios on the computer virtual space. The results revealed that integration index has the strongest relationship with crime occurrence both in the case of real study area and virtual space simulations. Though this study has several limitations on the extent of virtual space and realistic computer programming of agents' behavior, the results are meaningful to verify the relationship between the form of read network and crime occurrence. Moreover the simulation platform that this study developed has promising possibilities to find realistic solutions on the effective police deployment or facility layout to improve smart safe city development.

A Study of Scenario and Trends in Intelligent Surveillance Camera (지능형 감시 카메라 동향 및 시나리오 연구)

  • Chang, Il-Sik;Cha, Hyun-Hee;Park, Goo-Man;Lee, Kwang-Jik;Kim, Seong-Kweon;Cha, Jae-Sang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.93-101
    • /
    • 2009
  • As the industrial society is developing wars, terrors, and vicious crimes is getting increased. These dangerous factors are caused of casualty and subversiveness of social order. Such vicious crimes lead people to feeling of insecurity. That is why naturally people want to build and inspect strengthened security system. CCTV camera system which can be said as the most popular security system is being installed in public places has large number of floating population. This trend is required to develop the intelligent video security technology and propagate it since the importance of security technology is getting high. This thesis will be described regarding the trend of the intelligent surveillance camera and the scenario.

  • PDF

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

Detecting Abnomal Behaviors Using The Situation-aware RFID System (정황인지 RFID 시스템을 이용한 비정상 행동 예측 체계)

  • Chae, Hee-Seo;In, Hoh-Peter
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.832-834
    • /
    • 2005
  • 유비쿼터스 컴퓨팅의 중요한 핵심 분야인 Situation-Aware 컴퓨팅과 RFID 시스템을 결합한 SA-RFID 시스템을 통해, 제한된 장소에서 범죄나 사고 같은 비정상적인 행동을 예측하기 위한 시스템을 제안하였다. SA-RFID 시스템을 이용한 비정상 행동 예측 시스템은 변형된 SA-RFID Reader 시스템 아키텍쳐와 그에 특화된 SA Middleware를 통해 설계되었고, 비정상 행동 판단 시나리오를 이용하여 명실상부 유비쿼터스 시대에 걸 맞는, 사용자에게 보다 더 안전하고 편안한 생활을 보장해주는 서비스를 제공하게 될 것이다.

  • PDF