• Title/Summary/Keyword: 불법어로

Search Result 25, Processing Time 0.026 seconds

The Value and Agenda on Seal of Joseon Royal Family Retrieved from USA (미국에서 환수한 조선왕실 인장문화재의 가치와 과제)

  • Seong, In-keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.47 no.4
    • /
    • pp.192-209
    • /
    • 2014
  • The important national cultural heritages were retrieved. April 25 2014, US President Barack Obama formally returned 9 Seals of Joseon Dynasty and Korean Empire in Korea-US Summit taken place in Cheong Wa Dae. These Seals were taken out of Deoksugung illegally by a US Marine Corps officer during Korean War, handed down to his posterity, and last November 2013 confiscated by HSI in San Diego. Through investigations above facts turned out and it was decided to return these relics to Koera. In the process of surveying these seals, I confimed the authenticity of them and transferred my opinion to Cultural Heritage Administration. In this paper, I try to summarize the historical value of each Seals and suggest the remaining task.

A Study on the Use of Police Force in the Public Assembly: Focused on the Vehicle-wall-blocking and water cannon (집회현장에서의 경찰의 물리력 사용현황과 개선방안: 차벽과 물포 사용을 중심으로)

  • Hwang, Mun-Gyu
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.307-337
    • /
    • 2017
  • The freedom of assembly is the fundamental freedoms guaranteed by the Constitution. However, as far as our reality is concerned, the freedom of assembly is guaranteed only when it is under the control of the police, and otherwise it is perceived as an object to be suppressed. Police say even that they will not tolerate even a small illegal law while referring to the "broken window theory". Therefore, regardless of the peaceful nature of the rally, it is too obsessed with 'compliance'. This attitude is causing the citizens who participated in the assembly to be put to the object to be suppressed. This paper analyzes the requirements and current status of police force, focusing on the vehicle-wall-blocking and water cannon as a means of using the police force, which is a recent problem, and suggests ways to improve it. First of all, the installation of the wall cuts off the essential communication function of the assembly by separating the meeting place from the object of protest. Thus, despite the warning for prevention in the face of illegal acts, other than installing a barrier, it should be allowed only in the 'urgent case where there is a risk of causing damage to the life, body or property of the person'. Without this urgency, the vehicle-wall-blocking should not be allowed to be proactive as well as preventive. Secondly, the water cannon is a police force that is likely to harm people's life and body. Therefore, aiming shots, which could pose a significant risk to the human body, should in principle be prohibited. However, considering its risk, it should be supplementary used only when there is no other alternative, only when the direct risk to the legal interest of the other person or the order of public well-being is 'obvious'. In addition, as for the use standard of such a thing, it is necessary to be specified by law.

  • PDF

Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection (Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.76-81
    • /
    • 2018
  • The Internet of Things (IoT), which is emerging as a future economic growth engine, has been actively introduced in areas close to our daily lives. However, there are still IoT security threats that need to be resolved. In particular, with the spread of smart homes and smart cities, an explosive amount of closed-circuit televisions (CCTVs) have been installed. The Internet protocol (IP) information and even port numbers assigned to CCTVs are open to the public via search engines of web portals or on social media platforms, such as Facebook and Twitter; even with simple tools these pieces of information can be easily hacked. For this reason, a big-data analytics system is needed, capable of supporting quick responses against data, that can potentially contain risk factors to security or illegal websites that may cause social problems, by assisting in analyzing data collected by search engines and social media platforms, frequently utilized by Internet users, as well as data on illegal websites.

Seongdam Song Hwan-gi's Understanding of Buddhism (성담(性潭) 송환기(宋煥箕)의 불교인식)

  • Kim, Jong-soo
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.38
    • /
    • pp.209-242
    • /
    • 2021
  • This manuscript started with the purpose of producing research that investigated and verified how Buddhism was understood by Seongdam (性潭) Song Hwan-gi (宋煥箕), the founder (宗匠) of Horon (湖論) who was active around the early 19 th century. Song Hwan-gi, Uam (尤菴) Song Si-yeol (宋時烈)'s fifth generation, was a scholar who had a deep sense of duty to inherit the Theory of Uam (尤菴學), and he adhered to the Confucian theory of genealogy (道統論) and Anti-Heresy Discourses. Thus, this manuscript expressed curiosity about Song Hwan-gi's understanding of Buddhism, which was the representative heresy. This manuscript examined the naming method of Buddhist clergy (僧侶), degree of pedagogical knowledge, and critical statements that were made concerning Buddhist tales (說話). Meanwhile, it is noticeable that the terms of address for Buddhist clergy were composed of four categories: general terms, honorific forms, palanquins [輿], and miscellaneous terms of address. This scheme conforms to the Buddhist-friendly aspects of Song Hwan-gi. Examples of these terms of address include Danseung (擔僧) and Yeoseung (輿僧), both of which were Buddhist clergy who carried palanquins. Naturally, Song Hwan-gi was helped by Buddhist clergy when he went sightseeing on famous mountains. In the meantime, Song Hwan-gi's pedagogical knowledge can be shown to be not especially profound based on his understanding of The Diamond Sutra, The Avatamska Sutra, and The Shurangama Sutra. Cheongnyansan Travel Records (淸凉山遊覽錄) and Dongyu Diary (東遊日記) make it clear that Song Hwan-gi had no interest in taking refuge in the three treasures of Buddhism (佛法僧 三寶). It is rather the case that he was deeply critical of Buddhism. On the other hand, Song Hwan-gi expressed profound sadness when he encountered the dilapidated remains (古蹟) of Buddhist temples and hermitages. Consequentially, it can be concluded that Song Hwan-gi's understanding of Buddhism contained examples of affirmation, acceptance, denial, and exclusion.

A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps (은닉형 Vault 안티포렌식 앱 탐색을 위한 XML 기반 특징점 추출 방법론 연구)

  • Kim, Dae-gyu;Kim, Chang-soo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.61-70
    • /
    • 2022
  • General users who use smartphone apps often use the Vault app to protect personal information such as photos and videos owned by individuals. However, there are increasing cases of criminals using the Vault app function for anti-forensic purposes to hide illegal videos. These apps are one of the apps registered on Google Play. This paper proposes a methodology for extracting feature points through XML-based keyword frequency analysis to explore Vault apps used by criminals, and text mining techniques are applied to extract feature points. In this paper, XML syntax was compared and analyzed using strings.xml files included in the app for 15 hidden Vault anti-forensics apps and non-hidden Vault apps, respectively. In hidden Vault anti-forensics apps, more hidden-related words are found at a higher frequency in the first and second rounds of terminology processing. Unlike most conventional methods of static analysis of APK files from an engineering point of view, this paper is meaningful in that it approached from a humanities and sociological point of view to find a feature of classifying anti-forensics apps. In conclusion, applying text mining techniques through XML parsing can be used as basic data for exploring hidden Vault anti-forensics apps.

Ginseng Poaching and Border Trespassing in Hunchun during the Qing Period (청대 훈춘의 인삼과 범월 )

  • Kim Seonmin
    • Journal of Ginseng Culture
    • /
    • v.5
    • /
    • pp.1-20
    • /
    • 2023
  • In 1749, during an incident near the Tumen River in Hunchun, six people, all Qing ginseng pickers, were killed by seven Korean soldiers from the Chosŏn garrison. The Chosŏn soldiers encountered the ginseng pickers on the border and agreed to exchange goods, but when they failed to receive the proper price for rice, the soldiers became angry and decided to attack the Qing ginseng pickers. The seven Korean criminals were executed a year and a half after the incident. The whole process regarding the arrest and investigation of the criminals, as well as the official exchanges between the Qing and Chosŏn governments, were recorded in detail in the Chosŏn document written in Chinese and the Qing documents written in Manchu. In dealing with this murder case, the Qing local officials focused on identifying the murdered victims, clarifying the victims' responsibilities, and disposing of their remaining belongings. On the other hand, the Chosŏn government focused on providing reports quickly to the Qing officials about the investigation of the criminals. In doing so, it tried to reduce the risk of any possible problems that the murder case on the border could cause in its relations with the Qing government. The relevant records on this murder case show various aspects of the Qing and Chosŏn relations, including the contacts between the people along the Tumen River, border trespassing, material exchanges, rules about ginseng picking, and border patrols. This case also reveals that the Qing and Chosŏn people from various classes had different relationships depending on their respective interests.

New Zealand's Catch Balancing Regime: A Model of Enforcement Strategies (뉴질랜드 어획량 균형 제도: 시행전략모델)

  • Nam, Jongoh;Dobrot, Gabriela
    • Environmental and Resource Economics Review
    • /
    • v.17 no.4
    • /
    • pp.775-812
    • /
    • 2008
  • This paper provides a theoretical approach to the New Zealand's Catch-Balancing Regime (CBR) with a reporting requirement under the Individual Transferable Quota (ITQ) system. The enforcement strategy depicted draws on recent literature regarding practical applications of the Revelation Principle. New Zealand's use of CBR-specific instruments such as deemed values, remains to be improved. However, some of its features can constitute a valuable example for regulators seeking to improve their methods of dealing with issues as bycatch or overfishing in order to maintain Total Allowable Catch (TAC) levels under emerging ITQ systems. The enforcement strategy analyzed has the potential to provide a more sustainable and efficient management of the fish stock, reduce discarding and stabilize monitoring costs, while improving the level of reporting compliance.

  • PDF

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.

The Hague Convention on Jurisdiction and Enforcement, of Judgments

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.16 no.1
    • /
    • pp.343-373
    • /
    • 2006
  • 지적재산권의 속지주의 원칙에 따라 전통적으로 지적재산권의 침해에 있어서 결과의 발생이 없는 행위지를 침해지로 인정하지 않았다. 어문과 예술작품을 보호하기 위해 1886년 체결된 베른협약(Berne Convention for the Protection of Literary and Artistic Works) 제5조 제1항은 저작자가 베른협약에 따라 보호되는 저작물에 관하여 본국 이외의 동맹국에서 각 법률이 현재 또는 장래에 자국민에게 부여하는 권리 및 이 협약이 특별히 부여하는 권리를 향유한다고 규정하여 내국민대우원칙을 천명하고 있다. 또한 베른협약 제5조 제2항은 저작권의 보호와 향유는 저작물의 본국에서 보호가 존재하는 여부와 관계가 없이, 보호의 범위와 저작자의 권리를 보호하기 위하여 주어지는 구제의 방법은 오로지 보호가 주장되는 국가의 법률의 지배를 받는다라고 규정하여 저작권 침해가 발행한 국가의 법률의 적용을 명시하고 있다. 인터넷과 무선통신 기술의 발달은 저작물을 디지탈 형식으로 실시간에 전세계에 배포하는 것을 가능하게 하였다. 특히 저작물의 인터넷상에서의 배포는 다국적 저작권 침해행위를 야기하여, 저작권자가 다수의 국가에서 저작권 침해소송을 제기하여 판결을 집행하는 것이 필요하게 되었다. 헤이그국제사법회의(Hague Conference on Private International Law)에서 1992년부터 논의되어 온 민사 및 상사사건의 국제재판관할과 외국판결에 관한 협약(Convention on Jurisdiction and Foreign Judgment in Civil and Commercial Matters)에서 채택된1999년의 예비초안(preliminary draft) 및 2001년 외교회의에서 수정된 잠정초안(Interim text) (이하 헤이그 협약 )은 저작권자가 저작권침해행위가 발생한 각 국가에서 저작권 침해행위를 금지하는 소송을 제기할 필요없이, 동 협약의 한 가맹국가의 법원의 저작권침해금지판결을 다른 가맹국가에서도 집행할 수 있는 가능성을 제시해 주는데 의미가 있다. 헤이그 협약 제10조는 불법행위(torts)에 관한 일반적인 재판관할에 관한 규정을 두고 있으며, 저작권침해에 관한 분쟁은 동 조항의 적용을 받는다. 제10조에 의해 당사자는 가해행위지 국가의 법원 또는 결과발생지 국가의 법원에서 소송을 제기할 수 있다. 결과발생지의 경우 제10조 1항 (b)는 피고가 자신의 행위가 본국의 법규에 비추어 동일한 성격의 손해를 초래할 수 있다라고 합리적으로 예견할 수 없었던 경우에 본 조항의 적용을 배제하고 있다. 인터넷을 통한 저작권침해의 경우, 피고가 자신의 국가의 법규하에서 합법적으로 저작물을 웹사이트에 게시하였으나, 그 행위가 다운로딩이 행해진 국가에서 불법인 경우, 피고는 저작권침해를 예견할 수 없었으므로 이에 문제가 제기된다. iCrave TV사건에서, 피고인 캐나다회사가 미국 및 캐나다에서 방송되는 텔레비젼 방송 프로그램을 자신의 웹사이트에 게시하여 이용자들로 하여금 컴퓨터를 통하여 방송을 재시청 할 수 있도록 하였는데 이는 캐나다에서 합법인 반면에 미국에서는 저작권 침해에 해당한다. 피고는 방송 프로그램을 인터넷상에서 재방송하는 것은 캐나다법상 합법이므로 저작권침해를 예견할 수 없었다고 주장하면서, 해당 사이트에 오직 캐나다 거주자만의 접속을 허용하고 미국 거주자의 접속을 제한하는 일련의 Click-Wrap 계약과 스크린 장치를 제공하였다고 주장하였다. 본 사건 피고의 주장을 받아들인다고 가정할 때, 제10조 1항(b)에 의해 원고는 결과발생지인 미국법원의 재판관할을 강제할 수 없을 것이다. 지적재산권을 둘러싼 분쟁에 관한 재판관할과 국제법상의 판결의 승인 및 집행의 통일성을 기하기 위하여 2001년 1월 세계지적재산권기구(World Intellectual Property Organization)가 제안한 WIPO 협약초안(Draft Convention on Jurisdiction and Recognition of Judgments in Intellectual Property Matters)은 헤이그 협약이 재판관할과 판결의 승인 및 집행에 대한 일반적인 접근을 하고 있는 점에 반하여 지적재산권자의 보호라는 측면을 고려하여 지적재산권침해소송에 국제재판관할권을 규정하고 있다. WIPO 협약초안 제6조는 저작권자가 저작권 침해를 막기 위한 합리적인 조치를 취한 국가에서 저작권 침해소송을 피할 수 있다고 규정하고 있다. 따라서 본 조항에 의할 경우, iCrave TV사건의 피고는 미국에서의 저작권 침해소송을 회피할 수 있을 것이다. 이상과 같이 헤이그 협약이 외국판결의 승인 및 집행을 가능하게 하고 있음에도 불구하고, 외국법원의 판결이 다수의 가맹국가에서 집행되지 못하는 가장 큰 장애는 대다수의 국가들이 외국법원의 판결이 공서양속(Public Policy)에 반하는 경우 판결을 승인하지 않는 예외규정을 두고 있기 때문이다. 미국의 경우, Uniform Recognition Act와 Restatement(Third) of Foreign Relations에 따른 공서양속의 예외규정(Public Policy exception)은 외국법원의 판결의 승인을 부인하는 근거가 된다. Yahoo! 사건에서 Yahoo! Inc.의 옥션 사이트를 통해 독일 나치 소장물의 판매가 이루어졌는데, 프랑스 형법상 이는 범죄행위에 해당하므로, 프랑스 법원은Yahoo! Inc.에게 프랑스 이용자가 당해 옥션 사이트에 접속할 수 없도록 모든 가능한 조치를 취할 것을 명하였다. 이에 미국 법원은 프랑스 법원의 판결은 Yahoo! Inc.의 미국헌법 제1 수정(First Amendment)의 언론의 자유(freedom of speech)에 반하므로 판결의 집행을 거부하였는데 이는 공서양속의 예외규정을 보여주는 예이다. 헤이그 협약 제28조와 WIPO 협약초안 제25조 또한 공서양속의 예외규정을 두고 있다. 본 논문은 인터넷과 통신기술의 발달로 야기되는 다국적 저작권 침해사건에서 한 국가의 법원의 저작권 침해금지판결이 다수의 국가에서 승인 및 집행될 수 있는 능성을 헤이그 협약과 WIPO 협약초안 및 미국판결을 중심으로 살펴보았다. 국제적으로 통일된 저작권법이 존재하지 않고 외국 판결의 승인을 부인하는 예외조항과 외국판결의 집행에 관한 각국의 이해관계와 준거법의 해석이 다른 현시점에서 지적재산권의 속지주의를 뛰어넘어 외국법원의 판결을 국제적으로 집행하는 것은 다소 어려움이 있어 보이나 국제적인 집행가능성의 열쇠를 제시하는 헤이그 협약과 장래의 국제조약에 그 기대를 걸어볼 수 있겠다.

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF