• Title/Summary/Keyword: Crime Changes

Search Result 71, Processing Time 0.022 seconds

Estimation of Fingerprint Image Quality in Accordance with Photographing Conditions (촬영 조건에 따른 지문 사진의 품질에 관한 연구)

  • Yu, Je-Seol;Jeon, So-Young;Kim, Kyu-Yeon;Kim, Ji-Yeon;Kim, Chae-Won;Jang, Jake
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.287-295
    • /
    • 2017
  • This study is aimed at observing effects of fingerprint image quality on various photographing conditions in the aspect of resolution. Discrimination between two friction ridges plays an important role in the value of fingerprint image, and it can be confirmed with quantification of pixels of boundary region which is existing between two friction ridges. In this study, several factors were estimated with same fingerprint image using Adobe photoshop CS 6 for analysis: changes of image quality by ISO, movement when photographing, and photographers' experience and skill. Consequently, there was no significant change of image quality by ISO. Furthermore, there was no significant difference in the hand-held images between crime scene investigators and laymen, yet there was significant difference between hand-held images and images using tripod in the aspect of resolution. This study shows that using tripod is very important in forensic fingerprint photography through empirical methods.

Detecting a deceptive attitude in non-pressure situations using K-LIWC (K-LIWC를 이용한 비압박 상황의 거짓 태도 탐지)

  • Kim, Young-il;Kim, Youngjun;Kim, Kyungil
    • Korean Journal of Cognitive Science
    • /
    • v.27 no.2
    • /
    • pp.247-273
    • /
    • 2016
  • Previous studies about lying were mainly executed in pressure situations, such as interviews or crime statements, which made people stressed. This study analyzed deceptive and non-deceptive writings in non-pressure situation through K-LIWC program, in which lies are rarely disclosed and hardly damage the liar even upon disclosure, Also, we compared these results with existing studies on lying. On both writing tasks, there were fewer first-person singular pronouns in deceptive writings than in the non-deceptive writings. The variables indicating cognitive complexity were less used by deceptive writings than by non-deceptive writings in first topic, but in the second topic, more were used by deceptive writings than true writings. In particular, previous studies claim that lies contain more negative emotional words while this report shows that lies in non-pressure situations contains more positive and fewer negative emotional words compared to truth. This finding implies that a situation influences the liar's psychological statement, which changes the contents of the lie.

Study of an Efficient Method for Securing Evidence During the Fire Investigation (화재조사 시 증거물의 효율적인 확보 방안에 관한 연구)

  • Ye, Su-Jo;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.43-47
    • /
    • 2016
  • The recent changes in the judicial system in South Korea, including the stronger trial-centrism and legal market opening, have made fire investigations seek more scientific evidence and structure. The collection of physical evidence is very important to prove the substantial truth of a fire at the court. Without the appropriate physical proof, the credibility of a fire investigation is lost as evidence in a court. Therefore, the fire investigation team needs to carefully handle the fire site and fire initiation evidence because evidence of a fire incident can be destroyed easily by chemical and physical damage. In addition, the fire investigation team also needs to carefully record the collections of any evidence including pictures and their analysis. This study proposed the needs of the procedure manual and guidelines that can provide a step-by-step process of fire investigations in South Korea. This study also helps fire investigation agencies to secure fire-scene evidence to distinctly investigate the facts of fire. The guidelines and manual can eventually improve the ways for the fire investigation processes in South Korea.

Topic and Source Diversity of the Front Page in the New York Times, Chicago Tribune and the Los Angeles Times from 1950 to 2000 (20세기 하반기의 미 신문 1면 보도에 대한 다양성 분석: 뉴스 토픽과 정보원의 분포를 중심으로)

  • Shim, Hoon
    • Korean journal of communication and information
    • /
    • v.30
    • /
    • pp.175-201
    • /
    • 2005
  • This study investigates the diversity of news topic and source of the New York Times, Chicago Tribune, and the Los Angeles Times in the second half of the twentieth century. In probing the conventional traits of the contemporary press, the researcher traced the changing patterns and trends of news values in terms of news-gathering routine in order to evaluate the journalistic role conception in terms of social responsibility theory. Findings indicated that the American press as a neutral transmitter has been consistently violated by source and topic bias without any significant changes during the last five decades. The data, however, revealed the evident shift of the contemporary press from the heavy reliance of official source to the business/economic source. In addition, news topics such as business, health, and education have replaced the conventional popular topics such as crime and accidents. By contrast, it was revealed that the unconventional topics such as poverty, labor and minority still fail to receive the large attention from the target papers.

  • PDF

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

Rethinking Los Angeles Koreatown: Multi-scaled Geographic Transition since the Mid-1990s (로스앤젤레스 한인타운 다시 생각하기: 1990년대 중반 이후의 다중스케일적 지리적 변동)

  • Park, Kyong-Hwan;Lee, Young-Min
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.2 s.119
    • /
    • pp.196-217
    • /
    • 2007
  • During the last decade, Los Angeles Koreatown experienced unprecedented changes transforming it from an immigrant ethnic enclave into a transnational economic space. Alongside of the city government's redevelopment plans and local Korean Americans' grass-root efforts to regenerate Koreatown, transnational Korean actors have aggressively invested in property as well as business sectors. However, despite these multi-scaled geographic transitions, Koreatown remains one of the poorest and most crime-infested inner-city communities in the City of Los Angeles. This paper, based on a 'place-based' bottom-up approach, investigates contradictory geographies of Koreatown in which multi-scaled network of hegemonic transnational, urban and local development actors has developed representational, unlived economies. This research points out that the recent urban regeneration of Koreatown has not only excluded but also exploited local community members such as transnational Korean/Latino workers in the area. This paper conclusively suggests that the sustainable future of Koreatown's development would stem from place-based community consciousness that crisscrosses racial and ethnic boundaries.

VPN technology analysis: How to protect against network attacks in a Linux environment (리눅스 서버 환경에서 네트워크 침해 대비를 위한 VPN 기술 분석)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Lee, Kwang-Yong;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.326-328
    • /
    • 2016
  • While hackers in early days intended to disable and devastate the system, these days people hack and attack the network in order to steal customer's private information from the big corporate, which changes the nature of the crime to cyber attack for money, eventually causing a lot of damages. One of the most efficient ways to protect this kind of network attack is VPN, referring to Virtual Private Network. VPN is a private networking technology that makes the public network available for only those who are concerned. This paper will suggest the VPN technology that can be applied to Linux server and related protocols and figure the applicable VPN out.

  • PDF

A Study on the Establishment of Metaverse-based Police Education and Training Model (메타버스 기반 경찰 교육훈련모델 구축 방안에 관한 연구)

  • Oh, Seiyouen
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.487-494
    • /
    • 2022
  • Purpose: This study proposes a Metaverse-based police education and training model that can efficiently improve the performance of various police activities according to changes in the environment of the times. Method: The structure of this system can generate Avatar Controller expressed using HMD and haptic technology, access the Network Interface, and educate and train individually or on a team basis through the command control module, education and training content module, and analysis module. Result: In the proposed model of this study, the command and control module was incorporated into individual or team-based education and training, enabling organic collaborative training among team members by monitoring the overall situation of terrorism or crime in real time. Conclusion: Metaverses-based individual or team-based police education and training can provide a more efficient and safe education and training environment based on immersion, interaction, and rapid judgment in various situations.

Text Network Analysis on Stalking-Related News Articles (스토킹 관련 언론기사에 대한 텍스트네트워크분석)

  • Eun-Sun Ji;Sang-Hee Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.579-585
    • /
    • 2023
  • The purpose of this study is to explore keywords within stalking-related news articles according to political orientation through the text network analysis, and then to examine the implicit intentions. Selecting total 1,607 articles including 824 articles of the conservative press(The Chosun Ilbo, The Joongang Ilbo) and 783 articles of the progressive press(The Hankyoreh, The Kyunghyang Shinmun) reported from January 1, 2018 to December 31, 2022, this study explored the aspect of topic category drawn through the topic modeling technique based on LDA(Latent Dirichlet Allocation). In the results of this study, the common topics of the conservative and progressive press were improvement of the perception of gender-based violence, personal protection & intensity of punishment, and disclosure of stalkers' personal information. Regarding the topics differently shown in those two press, the conservative press showed stalkers' harmful act, and outline of 'murder case at Sindang Station' while the progressive press showed request for aggravated punishment on the 'murder case at Sindang Station', and eradication of sexual exploitation crime (in cyber space). The results of this study imply that there are changes in the type of reporting according to ideological opinions about stalking in news articles.

Why do children loose their compliance with the law as they grow? (무법으로 태어나 준법을 거쳐 위법으로 성장하는 이유?)

  • Taekyun Hur
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.spc
    • /
    • pp.117-131
    • /
    • 2005
  • The present research integrated various theoretical perspectives of human unlawful behaviors in order to clarify the psychological mechanisms that underly the changes in compliance with and attitude toward law as time goes. Most well-known theories such as classical theory of crime, biosocial and evoluationary theories, and psychological perspectives including psycho-dynamic theory, personality, intellectual/moral development theories, and decision-making were discussed in their unique points in explaining human unlawful behaviors. Finally, social-learning theory and cognitive-dissonance theory has been suggested to explain the psychological mechanism of the phenomena in which people's attitude toward law and compliance with law become weaken through violation experiences of trivial lawful regulations. Especially, the logic of cognitive-dissonance theory (that people committed violation of trivial laws should experience dissonance with their original belief of compliance with law and negative arousal and try to remove the arousal by change their belief along with their behavior) were theoretically convincing to explain the phenomenon and supported by a series of experimental studies. Several practical implications for future constitutional and political activities were discussed in the basis of the cognitive dissonance theory.