• Title/Summary/Keyword: Property Crimes

Search Result 30, Processing Time 0.022 seconds

Use Strategies of CPTED for the Safety of University Campus (대학 캠퍼스의 안전을 위한 CPTED 운용전략)

  • Park, Dong-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.340-347
    • /
    • 2010
  • Though there are many crimes on and out university campus in Korea, no one knows anything about the size or the types of campus crime. But, there are many theft crimes and sex assault in the library and one-room village near the university campus. This study suggested the establish ways and means needed to improve the campus security system, with the focus on the CPTED(Crime Prevention Through Environmental Design). Various types of crime prevention methods are being considered instead of conventional crime suppression measures. Among them, CPTED is drawing global attention. Crime prevention through environmental design is a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts. A truly safe campus can be achieved only through the cooperation of all students, faculty, staff and visitors. The cooperation and involvement of the entire campus community in campus crime prevention is absolutely necessary. University should adopt a series of policies and procedures designed to ensure that every possible precaution is taken to protect persons and property on campus.

A Study on Industrial Technology Leakage and Effective Industrial Security Measures through analysis of domestic portal article data (국내 포털 기사자료 분석을 통한 산업기술유출 사례와 산업보안 강화 방안 연구)

  • Yang, Hyun Jung;Lee, Chang Moo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.3-13
    • /
    • 2017
  • In the knowledge-information society, many domestic companies put lots of investment in technical development to possess core technologies and intellectual property. However, in the results of passive investment in security to protect their technologies compared to the active investment in technical development, the technology leaks from many companies and research institutes are rapidly increasing. Such increase of technology leaks not only causes damage to companies, but also has harmful effects on national economy directly and indirectly. Even though it has been perceived that a lot of industrial technology leak crimes are committed by former/current workers of small and medium-sized businesses, it is hard to find researches that mainly compare and analyze them. Therefore, this study aimed to understand the actual status of industrial technology leaks by analyzing cases of industrial technology leaks from 2014 to 2016 based on the type of victimized companies, corporate internal leakers' positions, matter of complicity, tools used for technology leaks, and motivation for technology leaks. Through the analysis in each type, the patterns and characteristics of industrial technology leaks were researched, and also the exploratory research on industrial security for the prevention of industrial technology leaks was conducted.

Review for the Enactment of Anti-Terrorism Law in China: Comparing it to those in the USA, Britain and Germany (중국의 반(反)테러리즘법 제정을 위한 검토: 미국.영국.독일과 비교하여)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.45-55
    • /
    • 2014
  • China has vast land, variety of people, religions and cultures. China has faced terrorism threat from the struggles of people, religions and resources. The 11thStanding Committee of the National People's Congress of China decided to strengthen the anti-terrorism action on October 29, 2011. This study compared, analyzed and estimated the counter-terrorism laws of the USA, Britain and Germany thinking about the China's anti-terrorism decision. The counter-terrorism laws of the USA, Britain and Germany are largely composed of previous prevention of terror and oppression of it later. They enacted the laws both for people and property. They also rearranged the power and role of governmental institutes on counter-terrorism. The contents of the counter-terrorism laws are specific, detailed and systematic. But the anti-terrorism law of China has restriction on the power and roles for previous prevention and oppression of terrorism, handling of people and property. This study reviewed the foreign countries' counter-terrorism laws and the way to connect the regulations on terrorism crimes of the revised Chinese criminal law and the anti-terrorism decision, when they enact the anti-terrorism laws in China in the future.

A Study on the socio-economic impact of 3D Printing (3D프린팅이 사회·경제에 미치는 영향에 관한 연구)

  • Kim, Hyeon-Chang
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.23-31
    • /
    • 2015
  • With the expiration of main patent of printing method, public interest now has shifted to 3D printing. In this, it needs to shine a light on the negative effects, particularly in the socio-economic aspect of 3D printing. By analyzing the existing research findings, policy reports and press releases, the negative effects of 3D printing and its countermeasures were derived. The main drawbacks of 3D printing includes the following: It might cause 3D printing-related crimes(e.g. printed weapons, intellectual property infringement, etc.) and it poses a big threat to other related business sectors.(e.g. potential job loss in molding and medical equipments manufacturing industries) What's more, the nature of 3D printing that it is easy to operate attracts lots of people, which then leads to serious social and environmental problems-product liability, ethical issues, environmental pollution, and finally government's blindly excessive investment in 3D printing. To avoid such potential risks, the government should establish and enforce the institutional law, and guidelines. Government's rational investment decision is also inevitable for the short-term and long-term sustainability of 3D printing.

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

Research on the Level Evaluation Model of the Organization Research Security (조직의 연구보안 수준평가 모형 연구)

  • Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.109-130
    • /
    • 2020
  • Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization's research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

A Research Survey on the Characteristics of Burglaries: Focused on How to Utilize Private Security (침입절도 특성에 관한 조사연구: 민간경비 활용방안을 중심으로)

  • Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.15-35
    • /
    • 2010
  • A larceny means stealing others' properties, as one of crime types most closely connected with common people. Along with fraud, it is the mostly common property crime; in particular, the largest number of people are exposed to a burglary. This study aims to find the schemes to utilize private guards according to the characteristics of burglary. To do so, a questionnaire survey was conducted into an actual condition of official statistics of burglary and into the criminals of burglary, with a view to understanding the behavioral characteristics of burglary and suggesting defense mechanisms to prevent the crime. Burglary is not just a major crime to be dealt with by public guards like the police but also one to be handled increasingly more by private guards. It is why this study intends to identify how to utilize private guards in preventing the crime. Investigations were made into 208 burglars, who were inmates of 10 correctional institutions (prisons or detention houses) across the country. It is found that only about 24% of burglars committed the crime through rational choice, about 60.7% were feared of their arrest at the time of their crime, and a very high percentage (69.9%) of them were assured of their successful crime. Burglaries usually happened at night, mostly in a summer day when everybody goes away from home for vacation. Primarily, the crimes took place in a private house of urban residential quarters. What burglars considered mostly for target selection includes 'profitability,' followed by 'surveillance' and 'risk.' Most (42%) of them committed the crime for the first time ever. Generally, they were not inclined to commit the crime while under the influence of alcohol or drug, which might prevent them from making reasonable decisions. 73.9% of the criminals said that they committed the crime singly without any accomplices.

  • PDF

A Study on Jurisdiction under the International Aviation Terrorism Conventions (국제항공테러협약의 관할권 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.59-89
    • /
    • 2009
  • The objectives of the 1963 Tokyo Convention cover a variety of subjects, with the intention of providing safety in aircraft, protection of life and property on board, and promoting the security of civil aviation. These objectives will be treated as follows: first, the unification of rules on jurisdiction; second, the question of filling the gap in jurisdiction; third, the scheme of maintaining law and order on board aircraft; fourth, the protection of persons acting in accordance with the Convention; fifth, the protection of the interests of disembarked persons; sixth, the question of hijacking of aircraft; and finally some general remarks on the objectives of the Convention. The Tokyo Convention mainly deals with general crimes such as murder, violence, robbery on board aircraft rather than aviation terrorism. The Article 11 of the Convention deals with hijacking in a simple way. As far as aviation terrorism is concerned 1970 Hague Convention and 1971 Montreal Convention cover the hijacking and sabotage respectively. The Problem of national jurisdiction over the offence and the offender was as tangled at the Hague and Montreal Convention, as under the Tokyo Convention. Under the Tokyo Convention the prime base of jurisdiction is the law of the flag (Article 3), but concurrent jurisdiction is also allowed on grounds of: territorial principle, active nationality and passive personality principle, security of the state, breach of flight rules, and exercise of jurisdiction necessary for the performance of obligations under multilateral agreements (Article 4). No Criminal jurisdiction exercised in accordance with national law is excluded [Article 3(2)]. However, Article 4 of the Hague Convention(hereafter Hague Article 4) and Article 5 of the Montreal Convention(hereafter Montreal Article 5), dealing with jurisdiction have moved a step further, inasmuch as the opening part of both paragraphs 1 and 2 of the Hague Article 4 and the Montreal Article 5 impose an obligation on all contracting states to take measures to establish jurisdiction over the offence (i.e., to ensure that their law is such that their courts will have jurisdiction to try offender in all the circumstances covered by Hague Article 4 and Montreal Article 5). The state of registration and the state where the aircraft lands with the hijacker still on board will have the most interest, and would be in the best position to prosecute him; the paragraphs 1(a) and (b) of the Hague Article 4 and paragraphs 1(b) and (c) of the Montreal Article 5 deal with it, respectively. However, paragraph 1(b) of the Hague Article 4 and paragraph 1(c) of the Montreal Article 5 do not specify if the aircraft is still under the control of the hijacker or if the hijacker has been overpowered by the aircraft commander, or if the offence has at all occurred in the airspace of the state of landing. The language of the paragraph would probably cover all these cases. The weaknesses of Hague Article 4 and Montreal Article 5 are however, patent. The Jurisdictions of the state of registration, the state of landing, the state of the lessee and the state where the offender is present, are concurrent. No priorities have been fixed despite a proposal to this effect in the Legal Committee and the Diplomatic Conference, and despite the fact that it was pointed out that the difficulty in accepting the Tokyo Convention has been the question of multiple jurisdiction, for the reason that it would be too difficult to determine the priorities. Disputes over the exercise of jurisdiction can be endemic, more so when Article 8(4) of the Hague Convention and the Montreal Convention give every state mentioned in Hague Article 4(1) and Montreal Article 5(1) the right to seek extradition of the offender. A solution to the problem should not have been given up only because it was difficult. Hague Article 4(3) and Montreal Article 5(3) provide that they do not exclude any criminal jurisdiction exercised in accordance with national law. Thus the provisions of the two Conventions create additional obligations on the state, and do not exclude those already existing under national laws. Although the two Conventions do not require a state to establish jurisdiction over, for example, hijacking or sabotage committed by its own nationals in a foreign aircraft anywhere in the world, they do not preclude any contracting state from doing so. However, it has be noted that any jurisdiction established merely under the national law would not make the offence an extraditable one under Article 8 of the Hague and Montreal Convention. As far as international aviation terrorism is concerned 1988 Montreal Protocol and 1991 Convention on Marking of Plastic Explosives for the Purpose of Detention are added. The former deals with airport terrorism and the latter plastic explosives. Compared to the other International Terrorism Conventions, the International Aviation Terrorism Conventions do not have clauses of the passive personality principle. If the International Aviation Terrorism Conventions need to be revised in the future, those clauses containing the passive personality principle have to be inserted for the suppression of the international aviation terrorism more effectively. Article 3 of the 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, Article 5 of the 1979 International Convention against the Taking of Hostages and Article 6 of the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation would be models that the revised International Aviation Terrorism Conventions could follow in the future.

  • PDF