• Title/Summary/Keyword: 범죄학과 과학

Search Result 21, Processing Time 0.024 seconds

The Present and Future of Criminology (범죄학의 현재와 미래)

  • Don Soo Chon
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.2
    • /
    • pp.17-37
    • /
    • 2004
  • Criminology is not a science yet in the sense that the word is used to describe the hard science. It is due to the fact that sociologists have dominated in the study of crime and criminals. Thus, future criminological studies should adopt an interdisciplinary approach including such disciplines as biology, psychology, sociology, and so on. The interdisciplinary approach needs to pursue a general theory by systematizing the achievements from various disciplines in the explanation of criminal behavior. The current study also discussed several issues which are conducive to the scientific study of criminal behavior.

  • PDF

이색전문대학원순례 - 광운대 정보복지대학원

  • Korean Federation of Science and Technology Societies
    • The Science & Technology
    • /
    • v.34 no.4 s.383
    • /
    • pp.16-17
    • /
    • 2001
  • 올해 새학기에 개원한 광운대 정보복지대학원은 첨단 공학기술, 정보통신기술을 바탕으로 인문사회과학분야를 지식산업화 시키는 이색전문대학원이다. 인터넷 등 정보활용능력을 통하여 복지를 효율적으로 실현시킬 수 있는 전문가를 양성하는 이 대학원은 행정정보학과, 문화산업정보학과, 마약범죄정보학과, 사회복지학과 등 4개 학과와 6개 전공과정이 개설되어 있다.

  • PDF

Influencing Factors on Perceived Safety of CCTV among College Students (대학생의 CCTV 체감안전도에 대한 영향 요인)

  • Jin-Hwan Oh
    • Journal of the Korean Applied Science and Technology
    • /
    • v.40 no.4
    • /
    • pp.786-796
    • /
    • 2023
  • The purpose of this study was to examine the influencing factors of perceived safety for CCTV(Closed Circuit Television), and to confirm the correlation between fear of crime, social disorder, physical disorder in the community, and perceived safety for CCTV. Subjects were 140 students from one college located in H city using survey from June 17, 2022 to August 25, 2022. Data was analyzed by descriptive statistics, Pearson's correlation, and Stepwise multiple regression using the SPSS 23.0 program. As a result of the study, fear of crime was correlated with social disorder, physical disorder among community characteristics, and perceived safety of CCTV. Also, social disorder among community characteristics was correlated with physical disorder, perceived safety of CCTV, and physical disorder was correlated with perceived safety of CCTV. The factors affecting perceived safety for CCTV were fear of crime and social disorder, and the explanatory power was 57.2%(Adjusted R2=.572). In conclusion, it is necessary to improve the perceived safety of CCTV by improving the awareness of fear of crime and social disorder.

A Research of portable devices for respond to crisis situations (위기상황 대응을 위한 포터블 기기 연구 및 설계)

  • Kim, Myoung-Soo;Chang, Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.237-238
    • /
    • 2020
  • 최근 강력범죄가 빈번하게 발생하면서 이를 예방하기 위한 방안들이 활발하게 연구되고 있다. 특히 우발적으로 일어나는 범죄는 언제 발생할지 예측할 수 없기 때문에, 이러한 위기상황이 발생했을 때 즉각적으로 대처하는 것이 필요하다. 한편 과학 기술의 발달로 개인마다 스마트폰을 소지하고 있으며, 스마트폰은 단순한 통화 기능 뿐 아니라 TV, 카메라, 인터넷 등의 다양한 기능을 제공하고 있다. 본 논문에서는 음성인식을 기반으로 하여 위기상황에 효과적으로 대처하는 기술을 제안한다. 본 논문에서 제안하는 위기상황 대응을 위한 포터블 기기를 사용한다면 위기상황이 발생했을 때 적절하게 대처할 수 있을 것으로 기대된다.

  • PDF

Classification of Tor network traffic using CNN (CNN을 활용한 Tor 네트워크 트래픽 분류)

  • Lim, Hyeong Seok;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prevent the crime attempts in advance and secure the organization's information system. This paper proposes a novel classification model that can detect Tor traffic and classify the traffic types based on CNN(Convolutional Neural Network). We use UNB Tor 2016 Dataset to evaluate the performance of our model. The experimental results show that the accuracy is 99.98% and 97.27% in binary classification and multiclass classification respectively.

A Study on Building a Cyber Attack Database using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버공격 데이터베이스 구축방안 연구)

  • Shin, Kyuyong;Yoo, Jincheol;Han, Changhee;Kim, Kyoung Min;Kang, Sungrok;Moon, Minam;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.113-121
    • /
    • 2019
  • With the development of the Internet and Information Communication Technology, there has been an increase in the amount of Open Source Intelligence(OSINT). OSINT can be highly effective, if well refined and utilized. Recently, it has been assumed that almost 95% of all information comes from public sources and the utilization of open sources has sharply increased. The ISVG and START programs, for example, collect information about open sources related to terrorism or crime, effectively used to detect terrorists and prevent crime. The open source information related to the cyber attacks is, however, quite different from that in terrorism (or crime) in that it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage. In addition, the data itself of cyber attacks is relatively unstructured. So, a totally new approach is required to establish and utilize an OSINT database for cyber attacks, which is proposed in this paper.

Ballistic Cavity Simulation using Modified Bresenham Algorithm (개선된 브레즈넘 알고리즘을 이용한 탄흔 시뮬레이션)

  • Yunji Seok;Seongah Chin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.683-688
    • /
    • 2023
  • Content featuring next-generation weapons is continuously appearing in games and virtual reality. In the context of story development, the traces of a target's bullet marks are observed differently according to the unique characteristics of the rifle and bullet. Additionally, there is an example of using forensic ballistics to investigate crime by examining the traces of bullets. Understanding the relationship between the ballistic coefficient and cavity by ballistics is crucial during this process. This paper proposes a physics-based cavity simulation using the modified Bresenham's line algorithm, which can enhance realism in games and virtual reality. This simulation accurately models the trajectory of bullets and cavity formation upon impact, creating a more realistic representation of how bullets interact with materials. Overall, physics-based simulations can greatly enhance the realism and immersion of games and virtual reality experiences and can have applications in forensic investigations.

A Study on Computer Forensics for the Legal Evidence Effect and the Proof (법적 증거능력 및 증명력을 위한 컴퓨터포렌식에 관한 연구)

  • Lee, Do-Yeong;Kim, Il-Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1149-1152
    • /
    • 2004
  • 컴퓨터가 현대 생활의 필수 도구로 자리잡으면서 컴퓨터를 매개로 이루어지는 범죄행위에 대하여 법적인 처벌 문제가 중요하게 대두되고 있다. 컴퓨터범죄를 형사적으로 처벌하기 위하여는 디지털증거의 증거능력과 증명력이 인정되어야만 한다. 하지만 디지털증거는 그 특성상 조작, 손상, 멸실의 우려가 높다. 디지털증거가 형사소송법상 유효한 증거로서의 증거능력을 인정 받기 위하여는 데이터의 변형 없이 수집하고 때로는 손상된 디지털 증거를 복구하여 원본과 동일하게 복사하여 정확히 분석한 후 제출되어야 한다. 이와 관련된 학문 전반을 컴퓨터포렌식이라고 하는데 국내법 혹은 국제법적으로 유효한 절차 및 수단에 따라 관련 증거들을 수집하여 함은 물론이고 과학적인 논거들로 입증하는 것이 또한 매우 중요하다. 현재 국내법상 디지털증거에 관한 입법이 없으므로 일반적인 증거증력에 관한 규정과 일부 판례를 차용하여 증거능력과 증명력을 갖춘 컴퓨터포렌식 절차를 제안 한다.

  • PDF

The studies of developing latent fingerprint in general print papers by chemical reaction (화학반응을 이용한 일반 프린트용지의 잠재지문 현출에 관한 연구)

  • Roh, Seung-Chan;Choi, Mi-Jung;Kim, Man-Ki;Lee, Oho-Taick;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.155-163
    • /
    • 2007
  • Porosity paper evidence is encountered in case of forgery, kidnapping, fraud and terrorist activity. The present study was designed to evaluate the effect of three chemical reagents (Ninhydrin, 1,8-diazafluoren-9-one (DFO), Iodine fuming) to the quality of developed latent fingerprints on porosity printing papers and newspaper. In case of printing papers, print quality was better with Iodine fuming method than Ninhydrin and DFO treatment to developing latent fingerprints. Developing latent fingerprint on newspapers was achieved with Iodine fuming processing. The processing of Iodine fuming followed by DFO and by using blue light (orange red filter) exhibited better results with Iodine fuming. Enhancement of latent fingerprint detection image using Digital Imaging System was achieved.

Analysis of Steganography and Countermeasures for Criminal Laws in National Security Offenses (안보사건에서 스테가노그라피 분석 및 형사법적 대응방안)

  • Oh, SoJung;Joo, JiYeon;Park, HyeonMin;Park, JungHwan;Shin, SangHyun;Jang, EungHyuk;Kim, GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.723-736
    • /
    • 2022
  • Steganography is being used as a means of secret communication for crimes that threaten national security such as terrorism and espionage. With the development of computers, steganography technologies develop and criminals produce and use their own programs. However, the research for steganography is not active because detailed information on national security cases is not disclosed. The development of investigation technologies and the responses of criminal law are insufficient. Therefore, in this paper, the detection and decoding process was examined for steganography investigation, and the method was analyzed for 'the spy case of Pastor Kim', who was convicted by the Supreme Court. Multiple security devices were prepared using symmetric steganography using the pre-promised stego key. Furthermore, the three criminal legal issues: (1) the relevance issue, (2) the right to participate, and (3) the public trial issue a countermeasure were considered in national security cases. Through this paper, we hope that the investigative agency will develop analysis techniques for steganography.