• Title/Summary/Keyword: 범죄화 분석

Search Result 167, Processing Time 0.026 seconds

Effects of Korean Maritime Police Subculture on Organizational Conflict (해양경찰의 하위문화가 조직갈등에 미치는 영향)

  • Lim, You-Seok;Kim, Jong-Gil;You, Young-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.6
    • /
    • pp.688-693
    • /
    • 2016
  • In this study, various conflicts in the maritime police organization were diagnosed and police subculture, which is different from dominant mainstream maritime police culture, was concluded to cause conflicts. In addition, maritime police conflicts and conflicts due to the balance, confrontation, and contradiction between bureaucratic and democratic values in the maritime police organization itself are discussed. The results of analysis on the effects of Maritime police subculture on organizational conflict are as follows: First, the influence of cynicism on functional conflict was explored. The higher the level of lies of the persons under investigation, the more functional conflict appeared. Also, if a person showed a low level of credibility among the police, this also led to functional conflict. In addition, if an individual showed low levels of cooperation and credibility with the police, this resulted in hierarchical conflict. Second, the influence of machismo on functional conflict was also explored. It was found that female officers experienced conflicts because of poorer job performance compared to male counterparts. In hierarchical issues, female officers experienced conflict over the reduced scope of tasks assigned to them and lower job performance ability. Third, the effect of non-acceptance of change in functional conflict was not statistically significant. An aggressive attitude toward crime control and rejecting jobs unrelated to crime influenced functional conflict, and an aggressive attitude and performing jobs unrelated to crime lead to functional conflict.

A Study on the Reconstitution of CPTED Theoretical Model - Focused on the Analysis of Sustainable Development - (CPTED 이론 모델의 재구성에 관한 연구 - 지속가능한 발전 분석을 중심으로 -)

  • Liu, He;Hong, Kwan-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.302-315
    • /
    • 2020
  • The issue concerning how to integrate with the needs of sustainable development according to Crime Prevention Through Environmental Design(CPTED) theory still continues in the development process of the third-generation theory at the present stage. In addition, the issue is under worldwide controversy and discussion. What is more noteworthy is that the viewpoints under debate and discussion have an influence on the mutual effect and relationship between the theoretical model and the principles in the theoretical model, and the influence can never be underestimated. After a mastery of the overall context of theoretical development, it is believed in this study that the identity of CPTED theory development can provide a diverse understanding dimension and a communication method between the environment and environmental users. On the basis of identity the development of CPTED theory, the crime prevention design mode of CPTED needs to connect different dimensions of sustainability, with the design goal of livability as the starting point, the Top-down model to adjust the safety of the environment. By no means can the environmental condition be improved by solely relying on the previous physical design method in virtue of Bottom-up model. Therefore, in this study, the identity of CPTED will be set as the core combined with Top-down crime prevention design model to propose a visual proposal for the reconstitution of the theoretical model, rather than supplementing the application of the contents or principles at a certain stage. Hence, it is expected to provide reference and enlightenment for the sustainable development of CPTED theory.

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

Primary School Spatial Characteristics and Architectural Design Methods based on Prospect and Refuge Concept (조망과 은신개념으로서의 초등학교 공간특성과 건축설계 방법연구)

  • Shim, Eun-Ju
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.22 no.1
    • /
    • pp.1-12
    • /
    • 2023
  • With the possibility of preventing crime through environmental design, CPTED guidelines have been introduced and applied to various places. However, although guidelines may be a useful design tool, there are also limitations to referencing it in the early conceptual phase of school architecture. Therefore, the purpose of this study is to examine the concept of "prospect and refuge", which serves as the basis of CPTED, and derives architectural characteristics and application methods based on the concept. For the case study, this research selected six small to medium-scale elementary schools with outstanding creative ideas built within the last 10 years. The results showed that the spatial characteristics of the "prospect" can be achieved by organizing the three-dimensionality of the space, vista prospect, and design attention on circulation areas. The concept of "refuge" was realized through the segmentation of the mass and spatial enclosure. Although the subjects had different social conditions and educational directions in Korea, this study may be used as a theoretical framework for designing a safe school environment.

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

A Study on the Utilization of Private Security for Park Safety (공원안전관리를 위한 민간경비 활용방안 연구)

  • Kang, Yong-Gil
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.7-32
    • /
    • 2013
  • The idea of this study was derived from awareness of local governments and police's limitation on attempts to 'creating safe park'. The purpose of this study is to examine current political measures of preventing various types of possible crimes in the park and the limitation of those policies. Furthermore, this study aims to suggest possible explanations to utilize Private Security Sector for the effective and continuous way of managing park safety by considering legal and practical solutions and its expectations. The methods of analysis used in this study are, first, literature review of current park safety management policies. Second, this article examined implications of strategies of those policies throughout the case study of the USA's park safety policy. Third, this study suggested plans of action and role of Private Security Sector to improve park safety. The results present several arguments for the park safety. First, legislation of mandatory crime preventing programme in the early stages of designing park is required. Introducing the 'park special judicial police system' to the major parks for a immediate response to the crime can be one of suggestions. Moreover, proactive police response systems, such as one of the Seoul Metropolitan Police's policies- 'returning safe parks to a citizen' are required. Second, the case study of the USA regarding park safety confirmed that major parks in the USA have rigorous and detailed park regulations. It also showed that those parks take not only preventing measures, but also follow-up measures against crimes. Third, the results suggest creating human resources by contracting out Park Managers and Private Security Sector that have specialized experiences and techniques to prevent crimes and public disorders. Overall in this study, increased citizen's satisfaction level, control of continuous and systematic crimes, the spread of joint-production of public safety, and increased fields of the Private Security Sector are expected from the findings.

  • PDF

Analysis for Digital Evidences using the Features of Digital Pictures on Mobile Phone (디지털 사진 특성을 이용한 휴대전화 증거 분석 방안)

  • Shin, Weon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1450-1456
    • /
    • 2009
  • By the explosive growth of IT technologies, mobile phones have embedded a lot of functions and everyone can use them with facility. But there are various cybercrimes as invasions of one's privacy or thefts of company's sensitive information using a built-in digital camera function in a mobile phone. In this paper, we propose a scheme for analyzing evidences by digital pictures on mobile phones. Therefore we analyze the features of digital pictures on mobile phones and make databases of characteristic patterns based on the vendor and the model of mobile phone. The proposed scheme will help to acquire digital evidences by providing a better decision of the vendor and/or the model of mobile phone by cybercrime suspects.

  • PDF

Research Trends on Password Recovery of Encrypted Files (암호화된 파일의 비밀번호 복구 연구 동향)

  • Se-Young Yoon;Hyun-Ji Kim;Hwa-Jeong Seo
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.218-221
    • /
    • 2024
  • IT 기술과 매체의 발전으로 자료의 디지털화가 진행되면서 디지털 증거는 현대의 범죄 수사에서 중요한 부분을 차지하고 있다. 이러한 디지털 증거들이 암호화되어 있는 일이 빈번하게 발생함에 따라, 수사관은 수사 과정에서 직접 암호화를 해제해야 하는 어려움을 겪고 있다. 해당 문제에 대응하기 위해 암호화된 파일의 비밀번호를 복구하는 연구가 활발히 진행되어 왔으며, 암호 연산을 빠르게 처리할 수 있는 프로세서를 활용하여 복구 속도를 향상시키는 방안 또한 연구되고 있다. 본 논문에서는 현재 사용되고 있는 비밀번호 복구 도구들을 분석하고, 높은 사용률을 보이는 문서들의 비밀번호를 복구하는 기존 연구들과 함께 향후 연구의 방향성을 살펴본다.

EDR platform construction using ELK Stack and Sysmon (ELK Stack과 Sysmon을 이용한 EDR 플랫폼 연구)

  • Shin, Hyun-chang;Kong, Seung-Jun;Oh, Myung-ho;Lee, Dong-hwi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.333-336
    • /
    • 2022
  • With the development of IT technology, cybercrime is becoming sophisticated and intelligent. In particular, in the case of BackDoor, which is used in the APT attack (intelligent continuous attack), it is very important to detect malicious behavior and respond to infringement because it is often unaware that it has been damaged by an attacker. This paper aims to build an EDR platform that can monitor, analyze, and respond to malicious behavior in real time by collecting, storing, analyzing, and visualizing logs in an endpoint environment in real time using open source-based analysis solutions ELK Stack and Sysmon.

  • PDF

Study on the panorama image processing using the SURF feature detector and technicians. (Emgu CV를 이용한 자동차 번호판 자동 인식 프로그램 구현에 관한 연구)

  • Kim, Nam-woo;Hur, Chang-Wu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.830-833
    • /
    • 2016
  • 자동차 번호판 인식은 대중적인 감시 기술 중의 한 종류로서, 주어진 비디오나 영상 내 광학문자 인식을 수반한다. 고속도로나 국도 상에 과속 단속 시스템, 재형 건물이나 유통센서 및 주차장 등에서 주차 정산 시스템, 고속도로 톨 게이트에서 hi-pass 에러 및 불법 도주 차량 잔속 시스템, 전국 주요 도로 불법 주 정차 단속 시스템, 공공기관, 기업 출퇴근 시간 확인 및 외부 차양 안내 시스템 등의 지능형 교통 시스템(ITS)이나 국도 상에 범위 차량 검거 시스템, 사건 발생 시 주요 도로상에 설치된 CCTV를 통해 용의 차량 이동 추적 시스템, 이동식 범죄 차량 조회, 버스에 탑재된 버스 전용차선 위반 단속들의 지능형 방범 시스템 등에 활용하고 있다. 번호판 인식은 자동차 번호판 국부화, 번호판의 크기, 차원, 명암대비, 밝기를 조정하는 정규화, 개별문자를 얻어내는 문자 분할, 문자를 인식하는 광학 문자 인식, 번호판의 형태, 크기, 위치 들이 연도별, 지역별로 차이가 있는 번호판들의 데이터베이스를 비교하여 구문 분석을 하는 절차를 거친다. 본 논문에서는 EmguCV를 이용하여 구현한 번호판 감지를 수행하여 위치를 찾아내고, 오픈 소스 광학 문자 인식 엔진으로 잘 알려져 있는 테서렉트 OCR을 이용하여 번호판의 문자를 인식하는 자동 인식 프로그램을 구현하고 기술하였다.

  • PDF