• Title/Summary/Keyword: 수사적 효과

Search Result 67, Processing Time 0.026 seconds

Is it true?: A Meta-analysis on the Efficacy of CBCA in Detecting Truths (그 말은 진실일까?: CBCA의 진실 탐지 효용성에 대한 메타분석적 고찰)

  • Kim, Hye Jin;Lee, Sangmin;Hur, Taekyun;Choi, Seung-Hyuk
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.2
    • /
    • pp.121-149
    • /
    • 2021
  • Statement Validity Analysis (SVA) is utilized in criminal investigations and the court to assess the credibility of given statements. During this procedure, the criteria for Criteria-Based Content Analysis (CBCA) are used to evaluate whether statements include the characteristics reflecting actual experiences about the event in question. Various studies had been conducted on the efficacy (classification rates) of CBCA criteria, yet the consistency of the findings was not investigated. In the current study, a meta-analysis was conducted with Korean CBCA studies reported from 2004 to 2020 (a total of fourteen studies). As a result, the total score of CBCA was found to successfully discriminate truth and fabrication. A significant positive (+) effect size was found with four criteria (3, 4, 10, and 12), all of which are classified as cognitive criteria. However, contrary to the underlying assumption for CBCA, criterion 18, classified as one of the motivational criteria, showed a significant negative (-) effect size. Meanwhile, moderator analyses were possible for eleven criteria (2~9, 12, 13, 15) and the results showed the significant effects of potential moderator variables such as the gender and status of the participants, study types and designs, number of raters, and publication status. The current results suggests that more careful attention is required to each criterion-especially the cognitive criteria-rather than the total CBCA score as well as the possible moderator effects in order to assess truthfulness of the statements. The implication, limitations, and suggestions for future studies were discussed.

Literatual study on the herb med and the medication of resuscitation(蘇生術) of Jayaeksa(自縊死) and Yiksusa(溺水死) (자액사(自縊死)와 익수사(溺水死)에 사용된 약물분석(藥物分析) 및 투여방법(投與方法)에 대(對)한 문헌적(文獻的) 효과(考察))

  • An, Joung-jo;Seol, In-chan
    • Journal of Haehwa Medicine
    • /
    • v.10 no.1
    • /
    • pp.175-186
    • /
    • 2001
  • In the literatual study on on the herb med and the medication of Resuscitation(蘇生術) of Jayaeksa(自縊死) and Yiksusa(溺水死), the results were as follows; 1. As the single herb medication, gesim(桂心), sesin(細辛), johyub, chongyub(蔥萊)), banha(半夏), yukge(肉桂) etc. were used. 2. The $s{\breve{o}}ng$(性) of used medicines is mainly $ons{\breve{o}ng$(溫性) and $yuls{\breve{o}}ng$(熱性), the mi(味) is sinmi(辛味). 3. The $gwigy{\breve{o}}$ng(歸經) is all most $simgy{\breve{o}}gn$(心經) and $pyegy{\breve{o}}ng$(肺經). 4. The efficacy is geopung(祛風), geosub(祛濕) and geodam(祛痰) 5. On the method of herb medication, In Jayaeksa(自縊死), Chuibub(吹法), Guanbub(觀法) were most used, and In Yiksusa(溺水死), Guanbub(觀法) was most used.

  • PDF

An Exploratory Study upon the Determinants of Welfare Attitudes on Universalism vs Selectivism (보편주의 vs 선별주의 복지태도에 영향을 미치는 요인에 대한 탐색적 연구)

  • Kim, Sin-Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.191-197
    • /
    • 2021
  • This study purports to explore potential determinants of welfare attitudes toward universalism vs selectivism. For this purpose, literature review upon such subjects as definitions of universalism and selectivism and welfare attitudes has been done. The hierarchical regression analyses show several major results. First and foremost, the effects of those variables such as political orientation and attitudes toward free education and gratuitous child care, categorized as political-social stance were found to be significant. However, it was unexpected results that those variables which have been found signigicant in predicting welfare attitudes in previous literature, that is to say age, education and economic status especially were not to be found significant in predicting welfare attitudes toward universalism vs selectivism. There could be many underlying causes for this result including measurement errors, and this study strongly speculates that the division between universalism vs selectivism itself exists only both in purely conceptual level and in political rhetoric and therefore, universalism or selectivism as people's consistent and logical attitudes or consciousness may simply not exist at all.

Washington on a New Watershed in Denuclearization on the Korean Peninsula: Rethinking Its Strategies toward North Korea's Nuclear Development (한반도 비핵화의 분수령에 선 미국 : 미 대북핵 정책에 대한 재고(再考))

  • Lim, Jiyoung
    • Strategy21
    • /
    • s.43
    • /
    • pp.273-302
    • /
    • 2018
  • 1980년대 북 핵개발을 처음 발견 이후, 미국은 북한의 비핵화라는 정책목적달성을 위해 다양한 정책을 사용해 왔지만 현재까지 실패하였다. 미국의 대북 정책 실패의 결과는 북핵 문제의 고착화 속에서, 평양의 핵무기 개발 가속화 야기로 한반도 및 미국을 핵위협 속에 놓이게 하였다. 특히, 지난 해, 북미간의 가열된 공격적 수사와 행동에 의한 한반도 위기설은 절정에 달하였다. 해결의 실마리가 보이지 않던 한반도의 갈등 및 위기는, 지난 4월에 열린 남북 정상회담을 통해 25년간의 핵위협의 굴레를 벗어날 기회를 다시 한번 맞이하게 되었다. 남북 정상회담 이후 이어질 북미 정상회담 등 향후 미국의 정책은 한반도 비핵화를 위한 중요한 분수령에 다시 한번 서있다. 하지만, 과거의 25년간의 역사는 다시 맞이한 '한반도의 봄'에 대한 낙관적 희망만을 주지 않는다. 과거, 양자적, 다자적 협상을 이룸에도 불구하고, 북핵 문제는 다시 위기에 접어드는 반복된 패턴과 사이클 속에 악화 되어 왔기 때문이다. 비핵화의 분수령에 있는 미 정부는 다시 한번 과거의 정책을 뒤돌아 보고, 남북 정상회담을 통해 어렵게 맞이한 기회를 결실로 이룰 수 있도록 어느 때 보다 신중한 노력이 필요하다. 최근 몇 달간 북핵 문제는 경이로운 속도로 진전을 보였지만, 한순간의 정책의 실패는 최근 보여진 진전의 속도 이상의 속도로 문제를 악화 시킬 수 있으며, 그 결과는 작년 여름과 겨울의 위기보다 더욱 심각 할 수 있음을 명심해야 한다. 이러한 점에서 이 보고서는 과거의 역사 및 이론적 분석을 통해 과거 미국의 북핵정책 실패 원인을 분석하고 정책을 제언하는데 그 목적이 있다. 과거 미 북핵 실패의 원인은 크게 3가지로 보인다. 먼저, 포괄적인 그리고 북한 정권의 특성에서 비롯된 북핵 개발의 모티브를 정확히 이해하는데 실패하여, 북한의 정책적 계산을 변화 시키는데 실패 하였다. 둘째, 북한 문제를 둘러싼 외부적 복잡성이 미북핵 정책실패를 야기하였다. 한반도 문제는 과거부터 다양한 국가들의 이해관계에 둘러 싸여 왔다. 북핵 문제도 남북 및 미국을 비롯 중국 등 주변국의 복잡성이 불확실성을 가중시켜 문제를 더욱 복잡하게 하였으며, 미국의 대북 협상의 영향력을 약화 시켰다. 셋째, 과거 누적된 두 국가간의 불신은 협상 이후 상대의 신뢰 있는 이행에 대한 불신을 야기하여 미국의 정책의 효과성을 저해하였다. 미국은 북핵 개발 모티브에 대한 포괄적 이해와 한국 및 중국과의 다자외교로 과거의 실패를 극복하고 25년간의 북핵문제의 고리를 끊어야 할 것이다.

Persuasive Communication Strategy of Showhost in TV Homeshopping (TV홈쇼핑 쇼호스트의 구매설득커뮤니케이션 전략)

  • Lee, Jung-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.311-320
    • /
    • 2011
  • This study analyzed the persuasive marketing communication strategy which applied by showhost for TV homeshopping sales. Specifically, the current study focuses on the comparative analysis of tangible goods and intangible goods sales. Four sales homeshopping TV programs were selected for analysis: two overseas travel package products, one climbing clothes product and one produce of walnut. The method of rhetorical content analysis was conducted to analyze the strategy of persuasive communication. The results shows that , , were commonly used for both tangible and intangible products sales. But , , and were heavily utilized only for intangible products sales. The result of this study can contribute to provide theoretical background for future advanced research, although it has a limitation of only analyzing four sales programs.

A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis (소셜 네트워크 분석 기반의 금융회사 불법대출 이상징후 탐지기법에 관한 연구)

  • Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.851-868
    • /
    • 2012
  • After the financial crisis in 2008, the financial market still seems to be unstable with expanding the insolvency of the financial companies' real estate project financing loan in the aftermath of the lasted real estate recession. Especially after the illegal actions of people's financial institutions disclosed, while increased the anxiety of economic subjects about financial markets and weighted in the confusion of financial markets, the potential risk for the overall national economy is increasing. Thus as economic recession prolongs, the people's financial institutions having a weak profit structure and financing ability commit illegal acts in a variety of ways in order to conceal insolvent assets. Especially it is hard to find the loans of shareholder and the same borrower sharing credit risk in advance because most of them usually use a third-party's name bank account. Therefore, in order to effectively detect the fraud under other's name, it is necessary to analyze by clustering the borrowers high-related to a particular borrower through an analysis of association between the whole borrowers. In this paper, we introduce Analysis Techniques for detecting financial loan frauds in advance through an analysis of association between the whole borrowers by extending SNA(social network analysis) which is being studied by focused on sociology recently to the forensic accounting field of the financial frauds. Also this technique introduced in this pager will be very useful to regulatory authorities or law enforcement agencies at the field inspection or investigation.

The Multi Knowledge-based Image Retrieval Technology for An Automobile Head Lamp Retrieval (자동차 전조등 검색을 위한 다중지식기반의 영상검색 기법)

  • 이병일;손병환;홍성욱;손성건;최흥국
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • A knowledge-based image retrieval technique is image searching methods using some features from the queried image. The materials in this study are automobile head lamps. The input data is composed of characters and images which have various pattern. The numbers, special symbols, and general letters are under the category of the character. The image informations are made up of the distribution of pixel data, statistical analysis, and state of pattern which are useful for the knowledge data. In this paper, we implemented a retrieval system for the scientific crime detection at traffic accident using the proposed multi knowledge-based image retrieval technique. The values for the multi knowledge-based image features were extracted from color and gray scale each. With this 22 features, we improved the retrieval efficiency about the color information and pattern information. Visual basic, crystal report and MS access DB were used for this application. We anticipate the efficient scientific detection for the traffic accident and the tracking of suspicious vehicle.

  • PDF

A Legal Analysis of Identity Revelation of Malicious Crime's Suspect (강력범죄 피의자의 신상공개에 대한 법적 고찰)

  • Jeong, Cheol-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.156-168
    • /
    • 2012
  • As the increase of violent crimes such as robbery, murder, and rape has become a social problem, the government is considering institutionalizing the identification of criminals to prevent crime and to guarantee people's right to know. Such an atmosphere led to the approval of the revision of 'Special Law On the Punishment of Specific violent Crimes' in the National Assembly in April 2010. The revision allows the revelation of the profiles of crime suspects including the pictures of their faces at the investigation stage. However, whether the revision had been effective in preventing crime has not been demonstrated empirically. Moreover, identity revelation is a grave intrusion into privacy and an abuse of human rights such as personal rights and the right to a fair trial, since personal information of criminal suspects would be released to the media prior to the court's final judgements. Also it violates the principle of presumption of innocence, the principles of due process, the principle of double jeopardy, the principle of prohibition against excessive, the principles of clarity, and the principle of liability.

An Effective Control Method for Improving Integrity of Mobile Phone Forensics (모바일 포렌식의 무결성 보장을 위한 효과적인 통제방법)

  • Kim, Dong-Guk;Jang, Seong-Yong;Lee, Won-Young;Kim, Yong-Ho;Park, Chang-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.151-166
    • /
    • 2009
  • To prove the integrity of digital evidence on the investigation procedure, the data which is using the MD 5(Message Digest 5) hash-function algorithm has to be discarded, if the integrity was damaged on the investigation. Even though a proof restoration of the deleted area is essential for securing the proof regarding a main phase of a case, it was difficult to secure the decisive evidence because of the damaged evidence data due to the difference between the overall hash value and the first value. From this viewpoint, this paper proposes the novel model for the mobile forensic procedure, named as "E-Finder(Evidence Finder)", to ,solve the existing problem. The E-Finder has 5 main phases and 15 procedures. We compared E-Finder with NIST(National Institute of Standards and Technology) and Tata Elxsi Security Group. This paper thus achieved the development and standardization of the investigation methodology for the mobile forensics.

An Effective Counterattack System for the Voice Spam (효과적인 음성스팸 역공격 시스템)

  • Park, Haeryong;Park, Sujeong;Park, Kangil;Jung, Chanwoo;KIM, Jongpyo;Choi, KeunMo;Mo, Yonghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1267-1277
    • /
    • 2021
  • The phone number used for advertising messages and voices used as bait in the voice phishing crime access stage is being used to send out a large amount of illegal loan spam, so we want to quickly block it. In this paper, our system is designed to block the usage of the phone number by rapidly restricting the use of the voice spam phone number that conducts illegal loan spam and voice phishing, and at the same time sends continuous calls to the phone number to prevent smooth phone call connection. The proposed system is a representative collaboration model between an illegal spam reporting agency and an investigation agency. As a result of developing the system and applying it in practice, the number of reports of illegal loaned voice spam and text spam decreased by 1/3, respectively. We can prove the effectiveness of this system by confirming that.