• Title/Summary/Keyword: Criminal

Search Result 830, Processing Time 0.03 seconds

금융사고 실태 조사

  • Lee, Sang-Kyung
    • Journal of the Korea society of information convergence
    • /
    • v.7 no.1
    • /
    • pp.25-46
    • /
    • 2014
  • After examining the current situations of financial frauds and the reasons for their occurrence in the financial institutions through examples of financial frauds in domestic and abroad, this study presents ways to prevent such financial scams. The preventive measures consist of activities before and after the occurrence of financial frauds and during normal financial operations. The activities are as follows: 1. Preventive activity should be strengthened before the occurrence of financial frauds. That is, first, the enforcement of consistent internal control is needed. Second, in order to block the probability of financial frauds involved with employees, ethics education and a reward program for inside tippers need to be run. Third, financial institutions need to apply for comprehensive insurance policy to minimize the lost in case. 2. Preventive activity should be strengthened during normal financial operations. First, self authentication system for customers needs to be introduced. Second, dealings of day, week, and month need to be thoroughly checked and the system of audit needs to be expanded. Third, message service for the information on financial frauds and their preventive measures needs to be expanded. Fourth, public notification system against examples of financial frauds needs to be expanded. 3. Preventive activity after the occurrence of financial frauds should be strengthened. First, awareness for preventive measures such as imposing penalty on the manager needs to be enhanced. Second, strict restrictions on financial frauders such as a criminal charge needs to be strengthened. Third, there should be legal devices and resolutions in order to retrieve all the money deceived by financial frauds.

  • PDF

Analysis of True Nature of Taliban and Terror Threat to Korea (탈레반의 실체와 한국에 대한 테러위협 분석)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.97-107
    • /
    • 2012
  • Our nation, of which the term of dispatching troops is winded up at the end of this year, is facing presidential election time including the nuclear security summit meeting in March, opening of EXPO in May, and the general election. Hence, the possibility to select our nation at the strategy forming public opinion of military withdrawal through Taliban's terror is high. It coincides with public affair strategy of Taliban terror and learning effect by the past cases. If the possibility of terror threat of Taliban along with this is summarized, the period of threat will concentrate on and be heightened in the first half when the nuclear security summit meeting and EXPO open in our nation, and target and method have high possibility of collision terror of bomb carrying vehicle and suicide bomb on national government organizations or American facilities, and etc, and possibility of kidnapping on our people such as oversea tourists, missionaries, and so on. Terror groups joining the criminal act is to use Islam illegal aliens who already acquire base in our nation or entry maneuver of specialized terrorists connected to Al-Qaeda. Pretext of such terror is withdrawal of our military and western allies stationed in Afghanistan. Therefore, publicity terror of Taliban against our people living overseas and security measure of international events such as the world nuclear security summit meeting, Yeosu EXPO, and etc in the first half of this year should be thoroughly prepared, domestic illegal aliens' movement should be comprehended, and measure blocking international terrorists' relating to Taliban infiltration into our nation should be sought for. Also, there is need of early announcement of government's political will on our military stationed in Afghanistan.

Mediated Effect of Mobile Financial Crime Fear on the Relationship between Mobile Financial Crime Vulnerability Perception and Mobile Financial Using (모바일금융범죄 취약성인식과 모바일금융 사용 간의 관계에서 모바일금융 범죄두려움의 매개효과)

  • Kwon, Joon-Sung;Gong, Jung-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.305-314
    • /
    • 2020
  • Mobile environment is relatively free from time and space constraints, and has unique characteristics such as not applying physical and social vulnerability because of it's non-face-to-face channel. Since such spatial and temporal speciality is likely to appear in a different form from psychological action and action in a general face-to-face environment, it is necessary to conduct an empirical study based on the results of the existing research that has been studied as major psychological variables of action in mobile environment. However, advance research have not been conducted in earnest on the vulnerability and anxiety of the consumers in a new environment called mobile finance. so this study intends to establish the basis through empirical research. As a result, women among traditional vulnerable groups perceived themselves to be vulnerable in mobile financial environments than men and felt fear of crime strongly. In addition, the vulnerability of mobile financial crime did not have a significant direct effect on mobile financial use, but it was confirmed that mobile crime fear was mediated completely and had an indirect effect on mobile financial use.

The Propose a Legislation Bill to Apply Autonomous Cars and the Study for Status of Legal and Political Issues (제4차 산업혁명 시대의 자율주행자동차 상용화를 위한 안정적 법적 기반을 위한 법정책적 연구 - 자율주행자동차 특별법 제정(안)을 중심으로 -)

  • Kang, Sun Joon;Won, Yoo Hyung;Kim, Min Ji
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.1
    • /
    • pp.151-200
    • /
    • 2018
  • At the Davos Forum in 2016, the Fourth Industrial Revolution, a reference to cloud Schwab, is dramatically changing our lives, and at its height, self-driving cars are emerging as the talk of the day. But there are still many hurdles to overcome before the nation can successfully introduce and establish self-driving cars. In particular, it is necessary to change the paradigm of the legal system centered on human beings to one that includes artificial intelligence. The stable operation of the self-driving car era requires drastic changes to the people-centric legislation system. That is, it is necessary to collect information on the total number of drivers of self-driving cars (what is available), general vehicles on general roads, civil and criminal liability issues in the event of traffic accidents, and collection of insurance problems concerning autonomous driving vehicles. In this study, a separate bill was proposed to address the various legal issues arising from the operation of self-driving cars from a legislative perspective by considering the domestic laws related to road transport, the current state of legislation on foreign soil and legal issues related to self-driving cars.

Review for the Enactment of Anti-Terrorism Law in China: Comparing it to those in the USA, Britain and Germany (중국의 반(反)테러리즘법 제정을 위한 검토: 미국.영국.독일과 비교하여)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.45-55
    • /
    • 2014
  • China has vast land, variety of people, religions and cultures. China has faced terrorism threat from the struggles of people, religions and resources. The 11thStanding Committee of the National People's Congress of China decided to strengthen the anti-terrorism action on October 29, 2011. This study compared, analyzed and estimated the counter-terrorism laws of the USA, Britain and Germany thinking about the China's anti-terrorism decision. The counter-terrorism laws of the USA, Britain and Germany are largely composed of previous prevention of terror and oppression of it later. They enacted the laws both for people and property. They also rearranged the power and role of governmental institutes on counter-terrorism. The contents of the counter-terrorism laws are specific, detailed and systematic. But the anti-terrorism law of China has restriction on the power and roles for previous prevention and oppression of terrorism, handling of people and property. This study reviewed the foreign countries' counter-terrorism laws and the way to connect the regulations on terrorism crimes of the revised Chinese criminal law and the anti-terrorism decision, when they enact the anti-terrorism laws in China in the future.

A Study on the Method for Ethics Education of Information and Communication of the Undergraduate Students (대학생의 정보통신 윤리교육 방안에 관한 연구)

  • Yoo Ji-Bun;Lee Young-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.309-320
    • /
    • 2005
  • The harm caused by the opposite function of information and communication has also done increasing with making use of internet more spread. Especially the information and communication are even used as new criminal methods in the society. The objective of this study is to find the orientation on the ethics education of information and communication through the opinion of the undergraduate students who lead the culture of internet for suggestion of the target to raise the upright and sound members of society as well as to solve the above such problems and to establish the desirable model of the ethics. From the questionnaire result by the undergraduate students of S University, students in the field of Humanities and Social Science need the education against the opposite function of information and communication and also the education of netiquette of conscience and moral. In case of opinions in the field of Science and Engineering, the result shows that the students have the opinion on the necessity of the professional education to deal with the opposite function to information and communication as well as the education for upgrade of ability to make use of expert knowledge of information and communication toward the positive side. Finally, the students in the field of Medicine show that they have also the opinion to deal with the opposite function of information and communication. In addition, such result shows that they have the opinion of necessity to the special education against various addicted symptom related to the computer.

  • PDF

Analysis of Spatio-temporal Pattern of Urban Crime and Its Influencing Factors (GIS와 공간통계기법을 이용한 시·공간적 도시범죄 패턴 및 범죄발생 영향요인 분석)

  • Jeong, Kyeong-Seok;Moon, Tae-Heon;Jeong, Jae-Hee;Heo, Sun-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.1
    • /
    • pp.12-25
    • /
    • 2009
  • The aim of this study is to analyze the periodical and spatial characteristics of urban crime and to find out the factors that affect the crime occurrence. For these, crime data of Masan City was examined and crime occurrence pattern is ploted on a map using crime density and criminal hotspot analysis. The spatial relationship of crime occurrence and factors affecting crime were also investigated using ESDA (Exploratory Spatial Data Analysis) and SAR (Spatial Auto-Regression) model. As a result, it was found that crimes had strong tendency of happening during a certain period of time and with spatial contiguity. Spatial contiguity of crimes was made clear through the spatial autocorrelation analysis on 5 major crimes. Especially, robbery revealed the highest spatial autocorrelation. However as a autocorrelation model, Spatial Error Model(SEM) had statistically the highest goodness of fit. Moreover, the model proved that old age population ratio, property tax, wholesale-retail shop number, and retail & wholesale number were statistically significant that affect crime occurrence of 5 most major crimes and theft crime. However population density affected negatively on assault crime. Lastly, the findings of this study are expected to provide meaningful ideas to make our cities safer with U-City strategies and services.

  • PDF

Maxillofacial Trauma Trends at a Tertiary Care Hospital: A Retrospective Study

  • Jeon, Eun-Gyu;Jung, Dong-Young;Lee, Jong-Sung;Seol, Guk-Jin;Choi, So-Young;Paeng, Jung-Young;Kim, Jin-Wook
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.36 no.6
    • /
    • pp.253-258
    • /
    • 2014
  • Purpose: Maxillofacial fractures are rapidly increasing from car accidents, industrial accidents, teenaged criminal activity, and sports injuries. Accurate assessment, appropriate diagnosis, and preparing individual treatment plans are necessary to reduce surgical complications. We investigated recent trends of facial bone fracture by period, cause, and type, with the objective of reducing surgical complications. Methods: To investigate time trends of maxillofacial fractures, we reviewed medical records from 2,196 patients with maxillofacial fractures in 1981~1987 (Group A), 1995~1999 (Group B), and 2008~2012 (Group C). We analyzed each group, comparing the number of patients, sex ratio, age, fracture site, and etiology. Results: The number of patients in each period was 418, 516, and 1,262 in Groups A to C. Of note is the increase in the number of patients from Group A to C. The sex ratios were 5.6:1, 3.5:1, and 3.8:1 in Groups A, B, and C. The most affected age group for fracture is 20~29 in all three groups. Traffic accidents are the most common cause in Groups A and B, while there were somewhat different causes of fracture in Group C. Sports-induced facial trauma was twice as high in Group C compared with Group A and B. Mandible fracture accounts for a large portion of facial bone fractures overall. Conclusion: We observed an increase in facial bone fracture patients at Kyungpook National University Dental Hospital over the years. Although facial injury caused by traffic accidents was still a major cause of facial bone fracture in all periods, the percentage decreased. In recent years, isolated mandible fracture increased but mandible and mid-facial complex fracture decreased, possibly because of a reduction in traffic accidents.

Introducing Best Model of Global Terrorism Database: The Case of START Center in the U.S. (국제테러리즘데이터베이스 구축: 미국의 START 센터의 모범사례의 소개)

  • Kim, Eun-Young;Park, Sun-Young
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.7-36
    • /
    • 2013
  • Collecting international terrorism database is a challenging task not only for criminal justice personnel but also for criminologists in comparison to the case of common types of crime database. Yet, there has been growing interests and efforts in establishing a comprehensive terrorist events data base in the world. This current study has a goal to introduce an example world terrorism database case developed by START center in the United States. The START center developed the Global Terrorism Database (GTD) on the basis of by the Pinkerton Global Intelligence Service data (PGIS) originally collected by the Pinkerton. Furthermore, The START expended the GTD by collecting data from open source terrorist event data via internet and other resources. In this study, specifically, it describes the development and the nature of the GTD in general and the data collection efforts made by the STATA until today. Finally, this study provides a sketchy of the nature of the GTD data by showing the descriptive statistical analyses and time-series analyses result illustrating distribution of the world terrorism events. The limitation, policy implications and contribution of this study discussed in this paper.

  • PDF

Security Problem of National Major Facility's Parking Lot and its Improvement Method -Focused on Doonchi(Waterside) Parking Lot of National (국가중요시설의 주차장 보안의 문제점과 개선방안: 국회둔치주차장을 중심으로)

  • Lee, Sang-Hun;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.61-87
    • /
    • 2017
  • National Assembly is a constitutional institution that is required to first consult the will of the people and it should do its effort continuously so that security of citizens using parking lot would be enhanced at the same time while improving parking service in order to increase customer satisfaction of the people. Under this recognition, in this study, Doonchi parking lot of National Assembly under consigned management was first reviewed in a perspective of criminal prevention through environmental design(CPTED) and particularly, fence installation and reinforcement work for securing 'territoriality' and operation of all round shooting camera and installation of No-trespassing warning board at entrance were suggested. Second, it was recommended to change independent control system in which CCTV security system of National Assembly Doonchi parking lot is operated separately from National Assembly safety situation room and integrate it with National Assembly safety situation room(revised to double safety system) and performance of CCTV camera was made to be increased to over 2m. In addition, video recording mode was converted to NVR mode for application to IP camera in the future and in order to avoid dead zone of security monitoring area and based on site inspection result, addition 3 places of newly installing CCTV were indicated. Third, it was recommended to introduce parking fare billing and management system through unmanned equipment in parking lot management and operation.(specialized management of professional parking service provider was reviewed). By doing so, risk of cash handling by charging personnel was removed by reducing current 7 working personnel to 3 and particularly, by converting parking lot management mode being operated temporarily from 9 A.M. to 9 P.M. at present to 24 hours operation mode and providing more specialized parking service, citizens visiting National Assembly were provided with convenience and image of National Assembly was also enhanced. This study was carried out in parallel with various literature and case studies, including data from the Office of the Defense Protection in the National Assembly.

  • PDF