• Title/Summary/Keyword: 범죄화 분석

Search Result 167, Processing Time 0.036 seconds

A implement of blackbox with in vehicle network data and the external sensor data (차량내부정보와 외부센서를 사용한 블랙박스 구현)

  • Kim, Jang-Ju;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2471-2477
    • /
    • 2010
  • lately, vehicle blackbox increasing importance and usability Is needed accuracy and variety of information. because, blackbox help to analyze the exact cause of the accident and use as objective evidence in vehicle-related crime. In the paper, to overcome the limitations of the existing black box, use various sensors and vehicle information blackbox store current state of the vehicle with OBD-II protocol using vehicle state information and store exact current location and direction information of the vehicle with Gyro sensor and GPS and use global time of GPS for synchronization of information. In addition, blackbox back the information up with wifi. because, when blackbox damaged, dirvers were able to verify the information.

Proximity Measurement between Communication Objects (통신 객체들 간의 친밀도 측정)

  • Kwon, Jeong-Eun;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.4
    • /
    • pp.275-279
    • /
    • 2009
  • Many countries including the US and ED oblige telecommunication service providers to retain communication logs for a certain amount of time. The retained data are used for the purpose of the investigation, detection, or prosecution of serious crimes, but of huge size. In order to efficiently extract information such as a correlation between criminals and suspects, we must eliminate unnecessary data that occupy a large portion of communication logs. In this paper, we propose how to measure the proximity between communication objects using communication logs. The proximity let the collected data be analyzed efficiently: analyzing the data in the decreasing order of proximities or removing the data with low proximities before analyzing. The experimental results show that there is a correlation between proximities of our proposed measurement and estimation by people.

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

A implement of blackbox with in vehicle network data and the external sensor data (차량내부정보와 외부센서를 사용한 블랙박스 구현)

  • Kim, Jang-Ju;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.76-79
    • /
    • 2010
  • lately, vehicle blackbox increasing importance and usability Is needed accuracy and variety of information. because, blackbox help to analyze the exact cause of the accident and use as objective evidence in vehicle-related crime. In the paper, to overcome the limitations of the existing black box, use various sensors and vehicle information blackbox store current state of the vehicle with OBD-II protocol using vehicle state information and store exact current location and direction information of the vehicle with Gyro sensor and GPS and use global time of GPS for synchronization of information. In addition, blackbox back the information up with wifi. because, when blackbox damaged, dirvers were able to verify the information.

  • PDF

Axial map Implementation Using Linear Generalization of GIS data (GIS 도로 데이터의 일반화를 이용한 Axial map 구현 방법에 관한 연구)

  • Kwon, Soon-Il;Park, Soo-Hong;Joo, Yong-Jin
    • Spatial Information Research
    • /
    • v.18 no.4
    • /
    • pp.99-108
    • /
    • 2010
  • Space Syntax methodology can be quantitatively calculated spatial cognitive analysis by number of turns_ In the existing GIS-based spatial information service provide 'physical distance' due to the shortest distance as a priority. but pedestrians tends to choose the path with concerned a lot of emphasis of safety, more vitality way from the crime at night, traffic accidents, and comfort on a road. Human's 'psychological distance' may reflect the spatial information services and provided path should be. In this study, using GIS Road Data implements the axial map with idea of the linear simplification principles. Traditional axial map of the Space Syntax get the assumption from the actual traffic values by comparing the results of correlation relationship. Through these methods, the actual relationship between traffic and test values have the correlation value($R^2$= 0.5387) 50% level and was able to get the results.

Developing an Optimal Location Selection Methodology of Unmanned Parcel Service Box (무인택배함의 최적입지 선정을 위한 방법론 개발)

  • Lee, Hyangsuuk;Chen, Maowei;Choo, Sangho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.4
    • /
    • pp.13-24
    • /
    • 2017
  • This paper presents a sequentially combined method of determining location conditions, the number of unmanned parcel service box and their optimal locations. First of all, block, accessibility and main public facilities are considered as location conditions and then set-covering model and p-median model are adopted for deciding the number of unmanned parcel service box and optimal locations, respectively. A case study for a region composed of small housings and multiplex housings in Ansan is conducted to prove the validation and application of the proposed method. The result indicates that 2 unmanned parcel service boxes are necessary in specific public places. The research contributes to resonable choice of unmanned parcel service boxes, crime reduction relevant to delivery man impersonation and economic benefit due to parcel service industry growth.

A Study on the Possibility of Ignition by Disposable Lighter (사례를 통한 화재사(火災死)의 이해)

  • Jae, J.J.;Lee, C.W.;Keon, H.S.;Son, J.B.;Lee, J.I.;Choi, D.M.
    • Journal of Korean Institute of Fire Investigation
    • /
    • v.10 no.1
    • /
    • pp.59-75
    • /
    • 2007
  • The causes of the fire casualties were the heat burns, contacted by flame, before the period of industrialization. According to the economic has been developed drastically since 1990, residing space has been become bigger and sophistication and interior finishing materials have been diversified. Therefore, the suffocation casualties, caused by inspiration of toxic combustion gases, have been more increased than the flame casualties in recently. Also, the arson casualties have been increasing with the increasing of insurance crime to take the Insurance money. According to National Emergency Management Agency announcement, 31,778 fires was occurred nationwide in 2006 and the total casualties were 2,180 occurred. 446 persons were died among them. Because the exact investigation of fire, occurred the death, is very especially important that civil and criminal cases will be happened. Therefore, we studied about the cause of fire, the place of origin, and the group of casualties age on the axies of fires, which were occurred recently. And the identification method of fire casualties, the human behavior characteristic, the flame casualties and the suffocation casualties at fire scene.

  • PDF

Financial Industry Security: A Qualitative Study for Reducing Internal Fraud in Banking Institutions (금융산업보안: 은행권 내부부정 방지를 위한 질적 연구)

  • Suh, Joon Bae
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.165-185
    • /
    • 2018
  • Because financial industry is closely related to the daily lives of people, internal fraud such as embezzlement by the employees can cause serious damage to the national economy, including credit crunch and contagious bankruptcy, as once demonstrated in the Savings Bank Scandal in 2011. Therefore, the importance of financial industry security is being emphasized and developed into converged security that combines physical, human and cyber security. In this study, to prevent fraud caused by internal employees in Korean financial sector, in-depth semi-structured interviews were conducted with a total of 16 participants including bankers, officials of financial regulators, and security experts, who were in charge of risk management in the industry. The collected data were analyzed at three stratification levels such as individual, organization, and socio-cultural factor. Based on this analysis, policy recommendations were suggested for the development of financial industry security and reducing internal fraud in banking institutions.

An Evolutionary Concept Analysis of Helicopter Parenting (헬리콥터 양육에 대한 진화론적 개념분석)

  • Lee, Yong-Wha;Kim, Ji-Hyun;Yim, So-Youn;Chae, Myung-Ock;Lee, Hye-Rim;Oh, Jina
    • Child Health Nursing Research
    • /
    • v.20 no.4
    • /
    • pp.237-246
    • /
    • 2014
  • Purpose: Helicopter parenting is an emerging concept as a way of rearing adolescents and adult children. However, helicopter parenting from a nursing perspective has not been elucidated. Therefore, we undertook a concept analysis to understand the attributes, antecedents and consequences of helicopter parenting in the context of nursing. Methods: Using Rodgers' evolutionary concept analysis, we analyzed literature on helicopter parenting to discover critical attributes, antecedents, and consequences of this phenomenon. Data were collected from seven electronic search engines. Twelve studies matching inclusion criteria were reviewed. Results: Three core attributes of helicopter parenting were hovering, highly deep involvement, and proxy decision making. The antecedents and consequences were retrieved from three important domains including social, parent, and child aspects. Surrogate terms were black hawk, hummingbird, and hovercraft parenting, and related terms were stealth fighter and Kamikaze parenting. Conclusion: Based on the results of this study, helicopter parenting has both positive and negative effects on both children and parents. To enhance the positive effects, measurement tools for helicopter parenting and nursing interventions on parenting need to be developed.

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.