• Title/Summary/Keyword: Cyber-crime

Search Result 119, Processing Time 0.021 seconds

The Difference in Pupil Size Responding to Cognitive Load and Emotional Arousal Questions between Guilty and Innocent Groups (유죄 및 무죄 집단 간 인지적 부하 및 정서적 각성 질문에 따른 동공크기의 변화의 차이)

  • Cho, Ara;Kim, Kiho;Lee, Jang-Han
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.155-171
    • /
    • 2020
  • The purpose of this study is to examine the effects of emotional arousal and cognitive load on pupil diameter during a lie detection interview. The guilty group (n = 30) committed a mock crime (i.e., stealing cash) and the innocent group (n = 30) performed a mission (i.e., sending a message) in the research assistant's office. After that, their pupil size was measured using a wearable eye-tracker during the interview. The interview questions were classified with the three cognitive load, three emotional arousal, and three neutral questions. The results indicate that the main effects of group and time were not significant, but the interaction between group and time was significant. It means that when answering cognitive load questions, the guilty group showed larger increase in pupil diameter than the innocent group. The present study suggests that inducing cognitive load is more effective than inducing emotional arousal during an interview when using pupil diameter as an index of deception, and it is expected to improve the accuracy of lie detection.

  • PDF

Text Network Analysis on Stalking-Related News Articles (스토킹 관련 언론기사에 대한 텍스트네트워크분석)

  • Eun-Sun Ji;Sang-Hee Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.579-585
    • /
    • 2023
  • The purpose of this study is to explore keywords within stalking-related news articles according to political orientation through the text network analysis, and then to examine the implicit intentions. Selecting total 1,607 articles including 824 articles of the conservative press(The Chosun Ilbo, The Joongang Ilbo) and 783 articles of the progressive press(The Hankyoreh, The Kyunghyang Shinmun) reported from January 1, 2018 to December 31, 2022, this study explored the aspect of topic category drawn through the topic modeling technique based on LDA(Latent Dirichlet Allocation). In the results of this study, the common topics of the conservative and progressive press were improvement of the perception of gender-based violence, personal protection & intensity of punishment, and disclosure of stalkers' personal information. Regarding the topics differently shown in those two press, the conservative press showed stalkers' harmful act, and outline of 'murder case at Sindang Station' while the progressive press showed request for aggravated punishment on the 'murder case at Sindang Station', and eradication of sexual exploitation crime (in cyber space). The results of this study imply that there are changes in the type of reporting according to ideological opinions about stalking in news articles.

A National Survey on the Prevalence and Risk Factors of Child Sexual Abuse (아동기 성학대 발생과 배경요인)

  • Han, In-Young;Lee, Yong-Woo;Yoo, Seo-Koo;Park, Myung-Sook;Kim, Jin-Sook
    • Korean Journal of Social Welfare
    • /
    • v.60 no.2
    • /
    • pp.131-153
    • /
    • 2008
  • Based upon the first national sample of adult men and women, the study aims to examine the prevalence of chid sexual abuse in Korea and factors related to the incidence of child sexual abuse. The results of the study show that 20.8% of the sample experienced one or more types of sexual abuse in their childhood, which indicates that Korean society is not any longer immune to child sexual abuse. With regard to how to cope with sexual abuse, "not informed to anyone and did not get any help at all" is the most major one for all types of sexual abuse. Even those who got help were reported to depend heavily upon private routes such as parents, relatives, or friends, indicating the urgency of establishing systematic intervention schemes for the problem. The results of a logistic regression analysis show that gender of the child, involvement in delinquent behaviors, economic status of the family, number of siblings, and residence in high-crime region are significantly related to the incidence of child sexual abuse. These results of the study would be expected to provide a useful guideline for developing policies or intervention programs aimed to prevent or address child sexual abuse.

  • PDF

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

A Study on the Differences of Risk Assessment Tool and Personality Assessment Inventory by Recidivism Types of Juvenile Delinquents (재비행 위험성의 정도에 따른 비행촉발요인과 PAI의 영향요인)

  • Kim, Eun Mi
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.119-128
    • /
    • 2014
  • This Study investigated the differences of risk assessment tool and personality assessment inventory (PAI) by recidivism types of juvenile delinquents, the psychological factors that have a influence of juvenile behaviors. 268 incipient Juvenile criminals who had committed crime in the areas of Seoul, were categorized in the three degree of recidivism types. The result showed the significant differences among risk assessment tool, such as family functioning risk factor, school risk factor, away-from-home risk factor, delinquent risk factor, and personal risk factor. PAI scores among the recidivism type showed the significant differences on SOM, DEP, PAR, SCZ, BOR, ANT, ALC, DRG, AGG, SUI, STR, NON, DOM, and WRM. The predictor variables explained a risk assessment tool were STR, ALC, DEP, DOM and WRM in PAI scales. And the interventions and preventions about juvenile delinquents discussed in psychological aspects.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

A Study on Evaluation Parameters of Safety City Models (안전도시 모델의 평가지표에 관한 연구)

  • Joon-Hak Lee;Okkyung Yuh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.1-13
    • /
    • 2023
  • As interest in urban safety has increased since COVID-19, various institutions have developed and used indicators that evaluate the safety city model. Yongsan-gu was ranked No. 1 in 2021 by Social Safety Index evaluation and was selected as the safest city in Korea. However, the Itaewon disaster in Yongsan-gu in 2022 caused many casualties. The study of indicators for evaluating cities' safety was necessary. This study aims to examine domestic and foreign safe city models and review the differences between each model and the indicators used to evaluate safe cities. As a result of collecting 11 safe city models and analyzing each evaluation index, safe city models can be classified into program-based safe city models, such as the World Health Organization's International safe community and the UN Office for Disaster Risk Reduction's International Safe city. Considering the diversification of threats to safety, it is reasonable to comprehensively consider digital security, health safety, infrastructure safety, personal safety, environmental safety, traffic safety, fire safety, crime safety, life safety, suicide, and infectious diseases when evaluating safe cities as evaluation parameters.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

An Qualitative Study on Correctional institution Counselors' Perception of Ex-Offender's Experience regarding Reintegration into Family (수감자의 출소 후 가족복귀 경험에 관한 교정기관 상담자의 인식)

  • Dong Hun Lee ;Su Eun Kang ;Seung Hee Jee
    • Korean Journal of Culture and Social Issue
    • /
    • v.22 no.4
    • /
    • pp.595-622
    • /
    • 2016
  • This study aims to understand the process of family reunion of the ex-offenders. To this end, Korea Rehabilitation Agency under Ministry of Justice and Healthy Family Support Center conducted intensive interviews with ex-offenders, their families and with 8 counselors who are in charge of ex-offenders and their families' residential, psychological, and educational support. The data collected through the interviews were analyzed by Consensus Qualitative Research(COR). The followings are the results: the counselors found out that most of ex-offenders had experienced unhappy childhood which was lack of healthy relationship with their parents. Secondly, counselors noticed a common feature among the families of ex-offenders. The common feature was that they keep the fact that one of their parents was imprisoned to their children as a secret. Thirdly, through the data analysis, counselors could understand various factors that affect reunion of ex-offenders' families: the factors that helped successful reunion were ex-offenders' sense of responsibility, open and healthy communication among family members, and mutual understanding of being a good family member, whereas, irresponsible dependance to other family members, denier and avoidance from the family members against ex-offenders, and lost sense of being a family member were the factors that discouraged the reunion. It turned out that the kinds of crime that ex-offenders committed also affected family reunion. The processes of reunion were easier for those who served their time with fraud, embezzlement, whereas, it was much more challenging for those who served their time with rape, violence, or murder. Fourthly, counselors learned that "relaxation" is the key factor in the process of reunion of ex-offenders' families. They also emphasized that there should be thorough monitoring process before the intervention in the reunion process. This study contributes in terms of finding healthy ways of intervention with ex-offenders' families and developing programs that help ex-offenders to recover their relationship with their family.