• Title/Summary/Keyword: 수사

Search Result 808, Processing Time 0.048 seconds

The Value and Agenda on Seal of Joseon Royal Family Retrieved from USA (미국에서 환수한 조선왕실 인장문화재의 가치와 과제)

  • Seong, In-keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.47 no.4
    • /
    • pp.192-209
    • /
    • 2014
  • The important national cultural heritages were retrieved. April 25 2014, US President Barack Obama formally returned 9 Seals of Joseon Dynasty and Korean Empire in Korea-US Summit taken place in Cheong Wa Dae. These Seals were taken out of Deoksugung illegally by a US Marine Corps officer during Korean War, handed down to his posterity, and last November 2013 confiscated by HSI in San Diego. Through investigations above facts turned out and it was decided to return these relics to Koera. In the process of surveying these seals, I confimed the authenticity of them and transferred my opinion to Cultural Heritage Administration. In this paper, I try to summarize the historical value of each Seals and suggest the remaining task.

A Study on Drug trading countermeasures via internet and sns (인터넷과 sns를 이용한 마약거래 대응방안에 관한 연구)

  • Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.93-102
    • /
    • 2018
  • The drug trade among the general public via the Internet and sns have been increasing, which is becoming a social problem. The general public believe that even if they do the drug trade via the Internet and sns the probability of detection is low. so they will conduct drug trade via the Internet and sns. Therefore, if the general public recognize that there is a high likelihood of disclosure, drug trade via the Internet and sns are likely to decline. If the possibility of punishment increases through specification of controlled delivery techniques and Introduction of entrapment investigator, it seems that the general public can not easily deal with drug trade via the Internet and sns. Also by further subdividing the penalties for drug offenses, for simple drug buyers through cure-oriented treatment rather than punishment drug demand be suppressed and penalties for drug suppliers should be strengthened.

  • PDF

User's Willingness to Donate to a Personal Broadcasting Creator From a Rhetorical View (수사학적 관점에서의 인터넷 개인방송 크리에이터에 대한 이용자의 기부의사에 관한 연구)

  • Moon, Yunji
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.83-104
    • /
    • 2019
  • Purpose Recently, Internet personal broadcasting has been widely spreaded as a new media type by replacing traditional legacy media such as TV. Considering this phenomenon, this study aims to explore the effect of Aristoteles' persuasion factors on Internet personal broadcasting from a rhetorical view. The reason why users watch the Internet personal broadcasting is that they are persuaded by creator's expertness, empathy, or content usefulness. These factors can be regarded as persuasion factors. Therefore, with Aristoteles' rhetorical persuasion factors composed of ethos, pathos, and logos, this paper tries to investigate how persuasion factors affect user's emotional\ attachment and voluntary donation intention. Design/methodology/approach This paper proposes a model of the relationships among three rhetorical factors, user's emotional attachment, and donation intention. Specifically, ethos is regarded as creator's expertness and trustworthiness, and pathos refers to creator's empathy and social interaction. Last, logos refers to content usefulness and credibility. For testing a hypothetical research model, this study collected 468 surveys and empirically tested hypotheses using a structural equation model. Findings This study investigated how rhetorical factors (ethos, pathos, and logos) and emotional attachment further influence user's donation intention. The findings suggest that rhetorical factors of ethos and pathos enhances emotional attachment, followed by donation intention. Contrary to an expectation, however, logos was not significantly related to emotional attachment. Creators of Internet personal media and MCN providers should focus on the different effects of rhetorical factors and pay attention to the role of emotional attachment to encourage user donation.

Drought Analysis Using the Low Flow Frequency and Computation Model of Maintenance Flow (갈수빈도와 정상유량산정 모델을 활용한 가뭄상황 분석)

  • Son, Kyung-Hwan;Oh, Sung-Ryul;Choi, Kyu-Hyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.356-356
    • /
    • 2017
  • 최근 국토교통부 홍수통제소에서는 가뭄대응을 위해 1, 3개월 갈수예보를 시범적으로 운영하고 있다. 국가재난 위기경보단계(관심, 주의, 경계, 심각)에 따라 분류된 기준유량과 예측유량의 비교를 통해 갈수상황을 판단하며, 그 중 기준유량은 일본의 정상유량 산정 기법에 의해 계산된다. 그러나 우기 건기에 따라 상이한 유입량 및 물 사용량이 정상유량 산정에 고려되지 않았고, 각 위기단계별 물 부족상황이 재현되지 못하였다. 또한, 하천유량 부족은 가뭄과 관계가 밀접함에도 불구하고, 가뭄상황과의 연계분석이 이뤄지지 않았다. 본 연구에서는 갈수빈도와 정상유량산정 모델을 이용하여 기준유량을 재설정하고 가뭄상황을 분석하였다. 대상유역은 영산강유역으로 선정하였고, 보고된 하천수사용허가량, 댐 용수 공급량 및 10년 이상 장기간 관측된 관측소별 일 유량자료를 활용하였다. 일 관측유량을 7일 이동평균으로 변환한 후, 유황분석을 통해 $Q_{90}$을 산정하였으며, 빈도별 $Q_{90}$을 계산하였다. 정상유량 산정 모델에서 입력 자료(자연유량, 댐 공급량 및 하천수 허가량)에 가중치를 두어 양을 조절하고 각 빈도에 맞는 관개기 및 비관개기 기준유량을 산정 하였다. 가뭄지수로는 국내 활용성이 높은 Standardized Precipitaion Index (SPI) 및 Standardized Runoff Index (SRI)를 선정하였고, 이를 지속기간 1, 3, 6, 12개월에 따라 일별로 계산하였다. 7일 평균 관측유량이 기준유량 이하일 때, 이시점을 전 후로 가뭄지수의 시공간적 특성과 가뭄의 지속기간 및 심도를 분석하여 가뭄상황을 제시하였다. 본 연구의 결과는 갈수예보 시 하천유량 부족에 따른 물수지 및 가뭄상황에 대한 직관적인 판단과 갈수기 효율적인 하천수 조정 협의에 기여할 것으로 본다.

  • PDF

A Study on the Reserve Amount of Temperature Difference Energy in the Han River basin (한강권역의 하천수 온도차에너지 부존량 연구)

  • Nam, Jisu;Jung, Jaewon;Han, Daegun;Kim, Shinhoon;Kim, Hung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.261-261
    • /
    • 2017
  • 최근 전 세계적으로 지구온난화로 인한 집중호우, 가뭄, 태풍 등 자연재해가 빈번하게 일어나고 있다. 이에 2016년 유엔기후변화협약당사국총회(COP22)에서는 지구온난화의 심각성을 인식하고, 한국의 2030년 온실가스 배출 전망치(BAU) 대비 37% 감축 달성과 같이 국가별로 온실가스 감축 목표를 선정하였다. 이를 달성하기 위해 국내에서는 현재까지 사용되지 않았던 자연에너지원의 활용이 부각되고 있으며, 특히 미활용에너지 중 하천수의 온도차에너지가 활발히 논의되고 있다. 하지만 미활용에너지 활용에 앞서 에너지원으로의 적정성 분석이 반드시 필요하다. 본 연구에서는 국내 5대강 중 한강권역을 대상으로 하천수 온도차에너지의 부존량 또는 이용가능량을 산정하고자 하였다. 한강본류 6개 하천유지유량 고시지점을 대상으로 해당 지점의 30년간(1987~2016년) 유량자료를 이용하여 유황 및 계절별 유량변동 특성을 분석하였고, 부존량 및 이용가능량을 검토하였다. 부존량 및 이용가능량 분석을 위해서는 선행 연구에서 적용된 하천유지유량, 하천수사용허가량 및 용수수요량 등을 고려한 산정식을 적용하였다. 본 연구는 미활용에너지인 하천수 온도차에너지의 실제 이용가능량을 분석하여 새로운 에너지원으로 활용할 수 있는지 평가하기 위해 수행되었다. 본 연구의 결과는 하천수 온도차에너지의 온실가스 감축을 위한 화석에너지의 대체에너지로서 새로운 가능성을 평가하는 지표가 될 것이라 기대된다. 또한 하천수 온도차에너지의 실제적인 적용을 위해서는 추후 연구를 통해 생태계 등 환경에 미치는 영향을 분석하고, 설치 및 유지비용에 따른 경제성 평가가 필요할 것으로 판단된다.

  • PDF

Effect of Environmental Conditions on Estimation of Ambient Temperature for Minimum Postmortem Interval (PMI) in Korea (사후 경과시간 추정을 위한 현장 대기온도 예측에 국내 환경 조건이 미치는 영향)

  • Jeong, Su Jin;Park, Ji Eun;Lee, Hyo Jung;Park, Seong Hwan;Shin, Sang Eon;Lee, Jae Won
    • Journal of Science Criminal Investigation
    • /
    • v.11 no.3
    • /
    • pp.178-185
    • /
    • 2017
  • It is one of the most important factors to statistical estimation of ambient temperature for accumulated degree day (ADD) and minimum postmortem interval (PMI) in the incident scene. Until now, we applied the temperature of the nearest weather stations, adjusted temperature, or estimated the temperature by the linear regression analysis to estimate the temperature of the incident site. At this time, the estimated temperature may be changed according to the method of temperature estimation. And The accuracy of the estimated value may also vary depending on the environmental factors such as capacity, wind speed, humidity, and rainfall, which may affect measurement conditions and temperature. Therefore, we studied the effect of various environmental factors and measurement conditions for ambient temperature in Korea.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment (비할당 영역 데이터 파편의 압축 여부 판단과 압축 해제)

  • Park, Bo-Ra;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.175-185
    • /
    • 2008
  • It is meaningful to investigate data in unallocated space because we can investigate the deleted data. However the data in unallocated space is formed to fragmented and it cannot be read by application in most cases. Especially in case of being compressed or encrypted, the data is more difficult to be read. If the fragmented data is encrypted and damaged, it is almost impossible to be read. If the fragmented data is compressed and damaged, it is very difficult to be read but we can read and interpret it sometimes. Therefore if the computer forensic investigator wants to investigate data in unallocated space, formal work of determining the data is encrypted of compressed and decompressing the damaged compressed data. In this paper, I suggest the method of analyzing data in unallocated space from a viewpoint of computer forensics.

An Effective Control Method for Improving Integrity of Mobile Phone Forensics (모바일 포렌식의 무결성 보장을 위한 효과적인 통제방법)

  • Kim, Dong-Guk;Jang, Seong-Yong;Lee, Won-Young;Kim, Yong-Ho;Park, Chang-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.151-166
    • /
    • 2009
  • To prove the integrity of digital evidence on the investigation procedure, the data which is using the MD 5(Message Digest 5) hash-function algorithm has to be discarded, if the integrity was damaged on the investigation. Even though a proof restoration of the deleted area is essential for securing the proof regarding a main phase of a case, it was difficult to secure the decisive evidence because of the damaged evidence data due to the difference between the overall hash value and the first value. From this viewpoint, this paper proposes the novel model for the mobile forensic procedure, named as "E-Finder(Evidence Finder)", to ,solve the existing problem. The E-Finder has 5 main phases and 15 procedures. We compared E-Finder with NIST(National Institute of Standards and Technology) and Tata Elxsi Security Group. This paper thus achieved the development and standardization of the investigation methodology for the mobile forensics.

A Study on Notary System for Web Postings Digital Evidences (웹 게시물 증거를 위한 공증 시스템 도입 연구)

  • Kim, Ah-Reum;Kim, Yeog;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.155-163
    • /
    • 2011
  • Rumor or abusive web postings in internet has become a social issue. Web postings may be proposed on evidence in form of a screenshot in libel suit, but a screenshot can be easily modified by computer programs. A person can make ill use of the screenshot which is modified deliberately original contents to opposite meaning in a lawsuit. That makes an innocent person to be punished because it can have difficulties to verify despite analyzing the server data. A screenshot of web postings is likely to fail to prove its authenticity and it is not able to reflect the fact. If notarization for web postings is offered, clear and convincing evidence can be submitted in a court. So, related techniques and policies should be established In this paper, we propose some technical and legal conditions and design for notarization and archive system of web postings for litigation.