• Title/Summary/Keyword: International Crime

Search Result 117, Processing Time 0.028 seconds

A Case Study on Application of CPTED of Park Development Guidelines -With Suwon-City Park Development Guidelines as a Case- (공원조성 가이드라인의 CPTED 적용에 관한 사례연구 -수원시 공원조성 가이드라인을 사례로-)

  • Yeom, Sung-Jin;Hong, Youn-Soon
    • Journal of Environmental Science International
    • /
    • v.26 no.1
    • /
    • pp.97-107
    • /
    • 2017
  • In the recent trend where crime types are being diversified along with urban expansion, we are facing the reality of a 'taking-it-out-on-somebody' crime, which targets the public rather than a specific person with criminal intent, like a 'random target crime.' A park, which is a public space for urban dwellers' and residents' leisure and rest in the midst of social changes, can be called the spot where various crimes occur. This is because it is a space without boundaries, available for the influx of many and unspecified persons, thus making it difficult to specify users. For the purpose of keeping a park safe from crime and providing users with psychological stability, this study carried out its research to get basic knowledge of the introduction of CPTED (Crime Prevention Through Environmental Design) concept in park development. The park development guideline contents are analyzed based on the six principles of CPTED theory as per the space composition element of a park. As a result, this study found out a problem was that most guidelines applied to the space composition element of a park were fragmentary in applying the six principles of CPTED theory, and were focused on arrangement and installation of facilities.

A Study on the Legal Control of Aircraft Terrorism by International Criminal Court(A Suggestion for the Amendment of ICC Statute) (국제형사재판소(國際刑事載判所)통한 항공기(航空機)테러범죄 규제에 관한 연구- ICC규정(規程)개정 위한 입법론적 고찰을 중심으로 -)

  • Kim, Man-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.15
    • /
    • pp.40-66
    • /
    • 2002
  • The purpose of this paper is to investigate the legal controㅣ, by using the International Criminal Court(ICC) that will enter into force to the most serious crimes of concern to the international community as a whole, and regulates the jurisdiction with respect to the following crimes: (a) The crime of genocide; (b) Crimes against humanity; (c) War crimes; Cd) The crime of aggression. However, the existing ICC Statute excludes (e) Crimes, established under or pursuant to the treaty, which was regulated by the ICC draft statute that the International Law Commission(ILC) examined and submitted to the UN General Assembly in 1994, and which contained aircraft terrorism such as hijacking in the Hague Convention of 1970 or sabotage in the Montreal Convention of 1971 in Annex of ILC draft. Therefore, this paper examines the legal character of aircraft terrorism as one of the most serious crimes of concern to the international community as a whole, and suggests two kinds of legislative comments for the amendment of the ICC Statute including aircraft terrorism as an object of the jurisdiction of the Court, for suppressing aircraft terrorism in advance and ensuring equitable penalty by ICC system.

  • PDF

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Cybercrime as a Discourse of Interpretations: the Semantics of Speech Silence vs Psychological Motivation for Actual Trouble

  • Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;PASKO, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.203-211
    • /
    • 2021
  • The article studies the discourse and a legal uncertainty of the popular and generally understandable concept of cybercrime. The authors reveal the doctrinal approaches to the definition of cybercrime, cyberspace, computer crime. The analysis of international legal acts and legislation of Ukraine in fighting cybercrime is carried out. The conclusion is made about the need to improve national legislation and establish international cooperation to develop the tools for countering cybercrime and minimizing its negative outcomes. The phenomenon of nicknames is studied as a semantic source, which potentially generates a number of threats and troubles - the crisis of traditional anthroponymic culture, identity crisis, hidden sociality, and indefinite institutionalization, incognito style, a range of manifestations of loneliness - from voluntary solitude to traumatic isolation and forced detachment. The core idea is that it is the phenomenon of incognito and hidden name (nickname and other alternatives) that is the motivational stimulus for the fact of information trouble or crime.

Research on international examples on prevention of juvenile delinquency

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.151-157
    • /
    • 2020
  • The first thing we can consider to prevent juvenile delinquency is to punish those criminals. However, this is not always the proper solution. In consideration to the feature of juvenile period when they lack in proper judgment it is better to provide education than punishment so that they are not branded as criminals in our society. Also, by returning to the society, they can obtain social techniques and obtain the opportunity of making contribution to the society, which is also good for their career development. Combining international examples on juvenile delinquency prevention, there is a need to comprehensively evaluate level of probation and risk exposure of juvenile based on placement matrix of comprehensive strategy program in the US. Also, control solution by juvenile crime development phase should be made. In terms of control treatment based on crime phase, crime history should be considered when applying control. For the subject of preventing juvenile crime, it shouldn't be legal organizations like before but shall be home, school, local society, and legal organization together.

The research on enhance the reinforcement of marine crime and accident using geographical profiling (지리적 프로파일링을 활용한 해양 범죄 및 해양사고 대응력 강화에 관한 연구)

  • Soon, Gil-Tae
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.147-176
    • /
    • 2016
  • Korean Peninsula is surrounded by ocean on three sides. Because of this geographical quality over 97% of export and import volumes are exchange by sea. Foreign ship and international passenger vessels carries foreign tourist and globalization and internationalization increases this trends. Leisure population grows with national income increase and interest of ocean. And accidents and incidents rates are also increases. Korea Coast Guard's jurisdiction area is 4.5 times bigger than our country. The length of coastline is 14,963km including islands. One patrol vessel is responsible for 24,068km and one coast guard substation is responsible for 94km. Efficient patrol activities can not be provided. This research focus on this problem. Analyze the status and trends of maritime crime and suggest efficient patrol activities. To deal with increasing maritime crime rate this study suggest to use geographical profile method which developed early 1900s in USA. This geographical profile analyse the spatial characteristic and mapping this result. With this result potential crime zone can be predicted. One of the result is hot spot management which gives data about habitual crime zone. In Korea National Police Agency adopt this method in 2008 and apply on patrol and crime prevention activity by analysis of different criteria. Korea National Police Agency analyse the crime rate with crime type, crime zone and potential crime zone, and hourly, regionally criteria. Korea Coast Guard need to adopt this method and apply on maritime to make maritime crime map, which shows type of crime with regional, periodical result. With this geographical profiling we can set a Criminal Point which shows the place where the crime often occurs. The Criminal Points are set with the data of numerous rates such as homicide, robbery, burglary, missing, collision which happened in ocean. Set this crime as the major crime and manage the data more thoroughly. I expect to enhance the reinforcement of marine crime using this Criminal Points. Because this points will give us efficient way to prevent the maritime crime by placing the patrol vessel where they needed most.

  • PDF

A Study on the Countermeasures against International Computer Crimes - Focusing on The Police Investigation Procedure - (컴퓨터범죄의 국가간 대응방안에 관한 연구 - 경찰 수사절차를 중심으로 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.287-295
    • /
    • 2005
  • A Study on the Countermeasures against International Computer Crime focusing on the Police Investigation Procedure. These days, much more intelligent, varied and advanced techniques for computer crimes have been used than for development of technology. In particular, it has been reported that the damages are enormous. Damages of some computer crimes can not be accurately reported. This study is to speculate specific types of computer crimes and obtain its prevention and countermeasures centering on the Police Investigation Procedure. In particular, it is to speculate international cooperation under the condition that global damages occur frequently due to preparation of advanced network environment.

  • PDF

Study on the Criminal Information System of Police Cooperation Organization between European Nations (유럽의 국가간 경찰협력기구의 범죄정보시스템에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.263-271
    • /
    • 2008
  • This study is about the criminal information system of police cooperation organization between European nations. The criminal information system of police cooperation organization between European nations is the organization created by the sign of the Europol convention in 26 July 1995 and the effectuation in 1 October 1998 for European nations' cooperative confrontation with frequent international terror, international organization crime, drug trafficking, illegal immigrant smuggling, and other critical crimes. From the beginning, this organization established the criminal information system for overcoming the working limits of previous international police organization. This system consists of information system, work file, and index system and enables every national unit or other law enforcement agents to collect, exchange, and utilize the information. Additionally, it try to keep in step with the rapidly change time, such as the integration with CMS, the establishment of correspondence system against cyber crime, and the introduction of biometric database. The criminal information system of the Europol gives important suggestions to the police cooperation organization between nations, besides prevention and suppression against the international crimes in Europe.

  • PDF