• Title/Summary/Keyword: Cyber crime

Search Result 119, Processing Time 0.019 seconds

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A Study of Effect on Media Exposure and Cybercrime Perception (미디어 노출과 사이버범죄 인식 간의 영향 연구)

  • Ko, Du-Hee;Won, Young-A
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.67-75
    • /
    • 2016
  • This study focused on university students' risk perception of cybercrime through media exposure. For this purpose, I tried to figure out the results of risk perception on cybercrime with 8 factors. As a result, the lowest type of cybercrime was internet fraud, and it was caused by media type and degree of exposure, where university students get information about cybercrime. There's a difference of students' risk perception by media type, news media was the best. Depending on the media of the environment, even in the area of cyber crime there is a difference of perception of risk for each individual. And it can be confirmed that the risk perception in response to the exposure of the media has changed.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

Factors Affecting Information Security Practice of Elementary School Students (초등학생들의 정보보호실천에 영향을 미치는 요인)

  • Choi, Seung-Jae;Kim, Hyeong-Yeol;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.449-461
    • /
    • 2016
  • If students are not aware of the information security, they easily let others know their information or they use others' information with no sense of guilt. The information security education is necessary to protect and prevent students from cyber crime. However, South Korea's information curriculum has no specific information security education course and it has led a school or teacher to teach contents of information ethics superficially. The purpose of this paper is to find the factors affecting the information security practice of the elementary school students. For an empirical analysis, questionnaire survey was conducted and the Partial Least Square(PLS) was used to analyze the research model. The analysis results show that the information ethics awareness and the information security awareness have a positive impact on the information security practice. The results of this study are expected to help choose the specific information security curriculum required for the information security practice of elementary school students.

An Empirical Study on the Effect of Technical and Social Anonymity on the Self-control Behavior (온라인 커뮤니티에서 기술적, 사회적 익명성이 자기통제에 미치는 영향에 관한 연구)

  • Choi, Hee-Jai;Lee, Zoon-Ky;Kim, Jung-Won
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.63-74
    • /
    • 2009
  • There have been many previous studies about an effect of anonymity on self control behavior. However the previous studies are on the aspect of results such as the usefulness, the problems of cyber crime or a lack of trust by anonymity. This study identifies the accurate definition of the objective technical anonymity and subjective social anonymity. And it reveals the relationship among technical anonymity, social anonymity, community tie, and self control as an effect of anonymity. The result of survey shows that technical anonymity affects self control through social anonymity and the relationship between technical and social anonymity is affected by community tie. This study presents how the anonymity affects individual behaviors. So it can be used as a reference to the policy on anonymity of the internet.

  • PDF

Instructional Design of Self-directed Information Communication Ethics Education based on the UCC Dramatization Learning (UCC 활용 극화학습 기반 자기주도적 정보통신윤리교육 수업 설계)

  • Kim, Hyun-Bae;Mun, Jeong-Hee
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.4
    • /
    • pp.561-570
    • /
    • 2010
  • In recent years, we can see attempts to take advantage of UCC in a way of the education. But in the precedent studies there are not many guidance plans to help teachers apply UCC in the classroom. The purpose of this paper is to suggest a guidance plan to help teachers apply UCC in the classroom and to analyze the effect of educational using UCC Dramatization learning model on the expanding of students' self-directed learning ability in the information communication ethics education. For this, first, a teacher executes preliminary inspection about self-directed learning ability second, students study about "how to prevent them from cyber crime" using UCC Dramatization learning model. Third a teacher executes post inspection about self-directed learning ability and measures the degree of improvement on self-directed learning ability. The final step is to extract the implications from the analysis of the experiments.

  • PDF

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

Analysis of Newspaper Articles on Child Abuse Deaths (아동학대 사망사건에 대한 신문기사 분석)

  • Kim, Jihae;Chung, Ickjoong;Lee, Heeyoun;Kim, Kyunghee
    • Korean Journal of Social Welfare
    • /
    • v.65 no.2
    • /
    • pp.131-154
    • /
    • 2013
  • Although fatalities due to child abuse are frequently happened, there has been a dearth of research on the topic. The present research analyzes deaths due to child abuse in representative newspapers in order to examine incidences, causes, and characteristics of child abuse. The results showed that from 2000 to 2012 child abuse deaths occurred 141 cases. Most deaths due to child abuse were committed by single mothers, biological mothers, cohabiting women and stepmothers, and biological fathers. As regards the reasons of deaths due to child abuse, the frequency of newborn infant deaths as the result of abuse by single mother or single parent was the highest, and lack of parenting skills, postpartum depression, hardships of living and lack of financial abilities were followed. Also, subjects received extensive media coverage were crime compositions-stereotypes of child abusers, habitual and continual child abuse, lack of child abuse reporting and prevention system, and mild penalties. Finally, based on the results of the study, the implications to prevent and resolve deaths due to child abuse were discussed.

  • PDF