• Title/Summary/Keyword: Criminal

Search Result 830, Processing Time 0.025 seconds

The Analysis of Crime-Vulnerability Assessment using Spatial Data for Planning CPTED (셉테드(CPTED) 계획 수립을 위한 공간정보를 활용한 범죄취약성 평가)

  • Kim, Yeon-Seong;OH, Jeong-Won;Seo, Won-Chan;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.917-930
    • /
    • 2021
  • Recently, as part of the crime prevention measures that focus on spatial characteristics on the determinants of crime-causing, interest in crime prevention (CPTED) through environmental design has been increasing. This study analyzed crime vulnerabilities in Ulju-gun for the purpose of establishing a master plan for crime prevention urban design (CPTED). The 12 indicators, including demographic, socioeconomic, and physical factors, were sampled from prior studies. As a next step, statistical analysis resulted in criminal vulnerability indexes. According to the analysis, districts with a high demographic crime vulnerability indexes were concentrated on apartment complexes, while districts with high socio-economic crime vulnerability indexes have low land prices and high proportion of female population. Also, the districts with high physical crime vulnerability indexes were found to be heavily distributed commercial ones with a large number of entertainment places. However, there was a limit to generalizing the indicators of previous studies to local governments with different regional characteristics. Therefore, further studies should be carried out by establishing additional indicators considering regional characteristics in the future.

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

Private security development plan through security guard crime statistics analysis

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.283-288
    • /
    • 2021
  • The purpose of this paper is to provide basic data for related studies by comparing and analyzing crimes committed by security guards through criminal statistical analysis, and to contribute to the sound development of the private security industry by strengthening the professional ethics of security guards and reducing guard crimes. The purpose. As a results of a comparative analysis of the number of crimes by security guards and the crime rate are as follows. Although the total number of crimes committed in Korea and the number of crimes committed by security guards decreased every year, the crime rate of security guards was higher than the average crime rate. felonious crimes, violent crimes, customs crimes, and special economic crimes were consistently high. As a countermeasure against the results, first, interest in security guard crimes as perpetrators rather than as victims, second, reinforcement of professional ethics education through new training and job training, third, academic development and systematic It appeared as a specification of the definition and current status of security guards for the study.

A Study on the Problems and Improvement Plans of the Private Security Recruitment Process

  • Kim, Myung-Soo;Min, Byung-Nam;Lee, Seung-Hwan;Kim, Sung-Hee;Kim, Jae-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.179-185
    • /
    • 2021
  • Private security has the common job characteristics of the police and crime prevention, and is responsible for the safety of our society. However, the hiring process for private security is very different from that of the police. Therefore, in this study, the problems of the private security recruitment process were identified through the police recruitment process and improvement points were suggested. As a result of comparing and examining the recruitment process of the police, the recruitment of private security guards is carried out through education and training, and problems such as the training process and physical strength verification required for security work were investigated. In order to improve the problems in the private security recruitment process, the curriculum of criminal law and criminology, physical examination such as 100m running and left and right grip strength, and practical cases of security work should be added. It is hoped that this study will serve as a basic data for the development of the private security industry along with the recruitment of excellent security guards.

Assembly of Magnetic Nano-Fe3O4@GSH-Au NCs Core-Shell Microspheres for the Visualization of Latent Fingerprints

  • Huang, Rui;Tang, Tingting
    • Nano
    • /
    • v.13 no.11
    • /
    • pp.1850128.1-1850128.10
    • /
    • 2018
  • Glutathione (GSH), the protective agent and reducing agent, has been widely used to prepare gold nanoclusters (GSH-Au NCs) with stable fluorescence properties and negative charge of the surface. Meanwhile, polyethyleneimine (PEI) was used as the modification agent to synthesize magnetic ferroferric oxide nanoparticles ($Fe_3O_4$) with fantastic dispersibility and positive charge of the surface. Based on the electrostatic adsorption force, magnetic nano-$Fe_3O_4@GSH-Au$ NCs core-shell microspheres composed of magnetic $Fe_3O_4$ nanoparticles modified by PEI as the core and GSH-Au NCs as the shell were assembled. The prepared $Fe_3O_4@GSH-Au$ NCs microspheres harbored a uniform size (88.6 nm), high magnetization (29.2 emu/g) and excellent fluorescence. Due to the coordination bond action between Au atom and sulfhydryl (-SH), amino ($-NH_2$), carboxyl (-COOH) in sweat, $Fe_3O_4@GSH-Au$ NCs could combine with latent fingerprints. In addition, $Fe_3O_4@GSH-Au$ NCs with good fluorescence and magnetism could detect fingerprints on various objects. Significantly, the powders were not easy to suspend in the air, which avoided the damage to the health of forensic experts and the fingerprints by only powder contacting. Above all, $Fe_3O_4@GSH-Au$ NCs was successfully applied to the latent fingerprint visualization, which has great potential in forensic science.

Analysis on System Log of Huawei Smartphone (화웨이 스마트폰 시스템 로그에 대한 분석)

  • Park, Eunhu;Kim, Soram;Kim, Jongsung
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.9-17
    • /
    • 2018
  • Smartphone have become commonplace because they have the advantage of facilitating communication with others and making life easier. The smartphone's system log stores various data related to the user actions. Since 2015, Huawei has been growing rapidly, with its sales volume increasing and it was ranked second in the world in three years. The use of Huawei smartphones by many users means that Huawei smartphones are likely to be used to detect traces of criminal investigations, so we need to study system logs of Huawei smartphones. Therefore, in this paper, we analyze system log which is forensically meaningful for Huawei smartphone. We also propose how to use logs in forensic investigation.

Paralinguistic Behavior as a Deception Cue (거짓말의 단서로서 준언어행위)

  • Kim, Daejoong;Park, Jihye
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.187-196
    • /
    • 2019
  • This experimental study examines whether paralinguistic behavior is a deception cue in an interrogation. 92 college students participated in an experiment and were randomly assigned to two conditions. Participant were then asked to take the money or not to take the money according to the condition they were assigned. Then participants had a face-to-face interrogation. During the interrogation, participants' paralinguistic behavior was recorded and used for coding and analysis. Results reveal that participants' paralinguistic behaviors differ depending on question types and deceptive paralinguistic cues are speech speed and fillers for the closed critical question and response latency, response length, and fillers for the open critical question. These findings implicate that part of paralinguistic behavior could be a deception cue and thus these cues might be applicable to deception detection in real world criminal investigations.

Character Analysis of the Movie "THE HANDMAIDEN" (영화 [아가씨]의 악인형 분석)

  • Jeong, Moun-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.413-420
    • /
    • 2019
  • The purpose of this study is to analyze the main character characters of the movie [THE HANDMAIDEN]. All four characters in the movie [THE HANDMAIDEN] have in common is that they all have seen 'the Existence' and have the factors behind the villainous figure. Kozuki and Hideko had clear and typical symptoms, have been diagnosed as a structural layer of perversion and neurosis by Lacan's psychoanalysis Methodology. On the other hand, since Sook-hee and Ko-pandol have the nature of being a criminal, they have long been faced up to the existence. It was difficult to approach to the structural layer of psychoanlysis Methodology. Therefore, the PCL-R diagnosis used to analyze the personality type of Sook-hee and Ko-pandol and add structural analysis again. As a result, Kouzuki had an Sadist, Hideko had an obsessive compulsive and Sook-hee had an anti-social lifestyle, but she was in a normal emotional category. It was noted that the Ko-pandol was a potential Sadist and part of a sociopath.

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

Civil liability and criminal liability of accidents caused by autonomous vehicle hacking (해킹으로 인한 자율주행자동차 사고 관련 책임 법제에 관한 연구 -민사상, 형사상, 행정책임 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.19-30
    • /
    • 2019
  • As the 4th industrial revolution has recently become a hot topic, the importance of autonomous vehicles has increased and interest has been increasing worldwide, and accidents involving autonomous vehicles have also occurred. With the development of autonomous vehicles, the possibility of a cyber-hacking threat to the car network is increasing. Various countries, including the US, UK and Germany, have developed guidelines to counter cyber-hacking of autonomous vehicles, In the case of Korea, limited temporary operation of autonomous vehicles is being carried out, but the legal system to be applied in case of accidents caused by vehicle network hacking is insufficient. In this paper, based on the existing legal system, we examine the civil liability caused by the cyber hacking of the autonomous driving car, while we propose a law amendment suited to the characteristics of autonomous driving car and a legal system improvement plan that can give sustainable trust to autonomous driving car.