• Title/Summary/Keyword: Protection of Victim's Information

Search Result 20, Processing Time 0.024 seconds

Analizing Korean media reports on security guard : focusing on visual analysis

  • Park, Su-Hyeon;Shin, Min-Chul;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The purpose of this paper is to explore security guard's status and roles in society through media reports. Research method is to anlyze security Guard's 'Keyword Trend' and 'Keyword Frequency Analysis' by 'Big Kind' which enables 'News Big Data' analysis. The result came out by the analysis in sectional private security guard's history of settling down, growing up (quantity), and growing up (quality) by separating generations is that there are lots of attention and exposure from media about crime, security guard job, minimum wage, and 'Gabjil', but the images of security guard are recognized as victim of crime and 'Gabjil', and working in poor environment with minimum waged and ambiguous job, instead of people preventing crimes. In the future, stabilizing security guard's social status and work responsibility, and developing job professionalism are necessary to improve the images of security guard.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.

The Guarantee of Criminal Victim's Information Rights (범죄피해자의 정보권보장을 위한 방안)

  • Yang, Kyung Kyoo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2013
  • The most important thing in the trial reveal the truth regardess of civil trial or criminal trial. The criminal procedure should be amended to guarantee victims the right to attend court hearings, to receive information about the progress of their case. But the new Criminal Procedure Law 2007 stipulated merely reading right of investigation records after prosecution while reading and printing rights prior to prosecution were not legislated. All sections of the criminal justice process must ensure that the process of dealing with the offender should not increase the distress or add to the problems of victims of crime in secondary victimisation. Reading and printing rights of prior to prosecution should be stipulated at earliest to protect the criminal victims and to prevent the secondary victimisation, The purpose of this study is to practically protect the right of the victims on the criminal procedures.

Study on Preventing Retaliation against Crime Victims (범죄피해자에 대한 보복범죄 방지 대책에 관한 연구)

  • Choi, KeeNam
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.129-137
    • /
    • 2016
  • The guarantee of citizens' safety from crime is the reason for a nation's existence according to the social contract, and it is also a salient task in securing the citizens' right to the pursuit of happiness, which is a constitutional right expressing the nation's duty to its citizens. First, a procedure must be made mandatory that corresponds to the Miranda rule applied during the arrest of criminal suspect, which verifies whether there exists a risk of retaliatory crime to the victim of crime, crime reporter, or witness following their report of a crime or testimony. A measure to punish those who violate this should be devised. The second is the improvement of related laws and systems, such as expanding the scope of persons subject to protection from retaliatory crimes under the current law and strengthening information protection. Third, a retaliatory crime risk evaluation index must be developed, and the evaluation results must be quantified to clearly state measures and responsibilities, in detail, for personal safety at each level of intensity. The fourth is the expanded implementation of proactive personal safety measures for victims of crime and witnesses, as well as the development and application of advanced techniques. The last is a change in the perception s of those working for the judicial body. From the initial investigation stage of the crime to the diagnosis regarding the possibility of retaliation perpetrated on an ex-convict through psychological tests, systems of general cooperation, and mutual assistance must be established.

Legal issues on HAI (병원감염에서의 법적쟁점)

  • Lee, Soo kyoung;Yoon, Seok chan
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.133-162
    • /
    • 2019
  • Due to the nature of medical malpractice lawsuits, it is difficult for medical consumers, who are weak in getting information when it comes to health care problem, to secure all information inside the hospital. Even if you are confident about the hospital infection, it is true that people have difficult to obtain medical testimony by expert. It is seen as no easy task to testify to the malpractice of colleagues who work in the same field not only in our country but also abroad, when a doctor gives negative testimony to another doctor in a medical malpractice lawsuit. Although few health care providers will be motivated to take medical care from the outset, testimony or statements from a medical practitioner can have a significant impact on the outcome of a lawsuit, as it is impossible for the patient to control or be aware of the whole process of medical conduct, especially in the event of a hospital infection and the victim. If the hospital can prove the causality of damages caused by negligence of the employees or supervision of the hospital itself in a medical suit caused by the infection, the level of protection of the victim could be raised further. We sought to find a solution to these problems by looking at the provisions of other laws related to hospital infection. In particular, as the comparative legal review regarding hospital infection, Germany's legislative precedent sets a medical contract as a typical civil law contract, so it is thought that looking at German civil law regulations also has implications for Korean law. We also tried to improve the French Special Act 'rights of patients' and we can look at the consequent changes in court cases. Finally, the content of the U.S. case's and the theory of 'the doctrine of res ipsa loquitur' in relation to it show that doctors and hospitals have been forced to shift the burden of proof through this theory. This paper tried to find out the implications of mitigating the burden of proof by reviewing various issues that might be related to medical litigation of hospital infection from a comparative point of view.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.

A Study on the Doctrine of Standing in the Suits caused by the Press Reports (언론소송에 나타난 보도의 개별적 연관성과 당사자적격)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.34
    • /
    • pp.161-195
    • /
    • 2006
  • Standing to sue has become one of the most important and controversial issues in suits between the press and the victims injured by the press reports. Even thought Korean law was patterned after the European legal system, there is no denying that the Korean Constitution was influenced by that of the United States. The judicial system was also influenced by its counterpart in the United States. The doctrine of standing to sue has plagued the U.S. Supreme Court for several decades. The traditional test of standing in the federal courts was, at the beginning of the century, whether the interest asserted by the plaintiff amounted to a 'legal right', entitled to the protection of the common law. In recent years, the Supreme Court seems to have settled on a two-tiered method for determining whether a plaintiff has standing to sue in federal court. The first level of inquiry is the constitutional core, and the second is the judicially imposed prudential limitations. The purpose of this study is to find out the doctrine of standing in the legal proceedings caused by the press reports. The press needs to internally transform as well to prevent legal dispute, enforcing confirmation when collecting news materials and building up the device for pre-examining the news. The press is also requested to help sincerely the victim recover, realizing that they waste their reputation and credit not to mention a lot of time and monet during the legal dispute.

  • PDF

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.

A Grounded theory Approach on the Experience of Sexual Abuse Victims (성폭력 피해여성의 경험에 관한 연구)

  • Kim, Kyung-Hee;Nam, Sun-Young;Chee, Soon-Ju;Kwon, Hye-Jin;Chung, Yeon-Kang
    • Journal of the Korean Society of School Health
    • /
    • v.9 no.1
    • /
    • pp.77-98
    • /
    • 1996
  • This studies designed to work out a theoretical framework on the experience of sexual abuse from the perspective of grounded theory in an effort to provide more practical and efficient nursing intervention for female victims. The subcategories identified were "sexual abuse", "threatening", "absent mindness", "embarrassment", "horripilation", "dizziness", "wondrousness", "filthiness", "sexual curiosity", "violence level", "victim's age", "neighbors response", "victims personality", "common experience", "sexual abuse information", "family relations", "level of familiarity", "hiding", "suppression", "self-torture", "self-protection", "avoidance", "asking aid", "withdrawal", "hatred", "confusion", "dodging, "remmant", and "pursuing". The 29 subcategories given above were further integrated into 16 categories such as "victimizedness", "being astounded", "filthiness", "degree", "developmental stage", "response pattern", "personality", "rarity", "information availability", "family support", "cover-up", "escaping", "informing", "negative internalization", and "positive pursuit of change". The core categories linked to all the other categories turned out to be "being taken aback" and "filthiness" incorporating the relevant subcategories. A total of 23 theoretical hypothesis emerged in the process of analyzing data. 1. the grater sexual curiosity, the weaker the senses of being taken aback and filthiness. 2. The weaker sexual curiosity, the stronger the senses of being taken aback and filthiness. 3. The stronger the level of violence, The more violent the senses of being taken aback and filthiness. 4. The lower the level of violence, the weaker the senses of being taken aback and filthiness. 5. The younger the victims, the stronger the senses of being taken aback and filthiness. 6. The older the victims, The weaker the senses of being taken aback and filthiness. 7. 'Escaping' will transpire regardless of the given circumstances. 8. The weaker the senses of being taken aback and filthiness, the more probable 'informing' and 'escaping' transpire. 9. The stronger the senses of being taken aback and filthiness, the more probable 'informing' and 'escaping' transpire. 10. The more protective the response from 'informing' and 'escaping' transpire around, the more likely the response to being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 11. The more repelling the response from around, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 12. The more open minded the personality of the subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 13. The more closed the personality of tile subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 14. The more frequent the experience of sexual abuse, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 15. The less frequent the experience of sexual abuse, the more lilely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 16. The more available information concerning sexual abuses, the more likely response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping. 17. The less available information concerning sexual abuses, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 18. The more cohesive the family of the subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 19. The less cohesive the family of the subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 20. The less familiar the subject is with the abuser, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 21. The less familiar the subject is with the abuser, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping. 22. The more likely the response to 'being taken aback' and 'filthiness' is 'informing and 'escaping', the more positive changes the subject will pursue. 23. The more likely the response to 'being taken aback' and 'filthiness' is 'covering-up' and 'escaping', the more negative changes the subject will pursue. The following four hypotheses were conformed in the process of data analysis. 1) In case the level of violence is strong but 'being taken aback' and 'filthiness' in weak because of strong sexual curiosity and also if information concerning sexual abuse is not readily available and the frequency is low, negative internationalization marked by 'covering-up' and 'escaping' will take place despite the fact the subject is open-minded, the family is cohesive and the abuser is unfamiliar. 2) In case the level of violence is weak but 'being taken aback' and 'filthiness' is weak combined with weak sexual curiosity and also if information concerning sexual abuse is readily available and the response from around is protective and the frequency is high, the subject will pursue positive changes to 'being taken aback' and 'filthiness', further aided by the fact that the subject is open-minded, the family is cohesive and the abuser is unfamiliar. 3) In case the level of violence is strong and 'being taken abuse' and 'filthiness' is strong because of weak sexual curiosity and also if information concerning sexual abuse is reading available and the response from around is readily available and the response from around is protective and the frequency is low, the subject will persue positive changes marked by 'informing' and 'escaping' despite the fact that the family cohesion is weak and the abuser is familiar. 4) In case the level of violence is strong and 'being taken aback' and 'filthiness' is strong because of weak sexual curiosity and also if information concerning sexual abuse is not readily available and the response from around is respelling and the frequency is low negative internalization like 'covering-up' and 'escaping' will take place, further aggravated by the fact that the subject's personality is closed, family cohesion is weak, and subject is familiar. On the basis of the above finding, it is recommended that nursing intervention should focus on promoting the milieu conductive to the victims pursuing positive changes along with the adequate aids from protection facilities as well as from the people around them.

  • PDF

The Reserch on Actual Condition of Crime of Arson Which Occurs in Korea and Its Countermeasures (방화범죄의 실태와 그 대책 - 관심도와 동기의 다양화에 대한 대응 -)

  • Choi, Jong-Tae
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.371-408
    • /
    • 1997
  • This article is the reserch on actual condition of crime of arson which occurs in Korea and its countermeasures. The the presented problem in this article are that (1) we have generally very low rate concern about the crime of arson contrary to realistic problems of rapid increase of crime of arson (2) as such criminal motives became so diverse as to the economic or criminal purpose unlike characteristic and mental deficiency of old days, and to countermeasure these problems effectively it presentation the necessity of systemantic research. Based on analysis of reality of arson, the tendency of this arson in Korea in the ratio of increase is said to be higher than those in violence crime or general fire rate. and further its rate is far more greater than those of the U.S.A. and Japan. Arson is considered to be a method of using fire as crime and in case of presently residence to be the abject, it is a public offense crime which aqccompany fatality in human life. This is the well It now fact to all of us. And further in order to presentation to the crime of arson, strictness of criminal law (criminal law No, 164 and 169, and fire protection law No. 110 and 111) and classification of arsonist as felony are institutionary reinforced to punish with certainty of possibility, Therefore, as tendency of arson has been increased compared to other nations, it is necessary to supplement strategical policy to bring out overall concerns of the seriousness of risk and damage of arson, which have been resulted from the lack of understanding. In characteristics analysis of crime of arson, (1) It is now reveald that, in the past such crime rate appeared far more within the boundary of town or city areas in the past, presently increased rate of arsons in rural areas are far more than in the town or small city areas, thereby showing characteristics of crime of arson extending nation wide. (2) general timetable of arson shows that night more than day time rate, and reveald that is trait behavior in secrecy.(3) arsonists are usually arrested at site or by victim or report of third person(82,9%).Investigation activities or self surrenders rate only 11.2%. The time span of arrest is normally the same day of arson and at times it takes more than one year to arrest. This reveals its necessity to prepare for long period of time for arrest, (4) age rate of arson is in their thirties mostly as compared to homicide, robbery and adultery, and considerable numbers of arsons are in old age of over fifties. It reveals age rate is increased (5) Over half of the arsonists are below the junior high school (6) the rate of convicts by thier records is based on first offenders primarily and secondly more than 4 time convicts. This apparently shows necessity of effective correctional education policy for their social assimilation together with re-investigation of human education at the primary and secondary education system in thier life. The examples of motivation for arosnits, such as personal animosity, fury, monetary swindle, luscious purpose and other aims of destroying of proof, and other social resistance, violence including ways of threatening, beside the motives of individual defects, are diverse and arsonic suicide and specifically suicidal accompany together keenly manifested. When we take this fact with the criminal theory, it really reveals arsons of crime are increasing and its casualities are serious and a point as a way of suicide is the anomie theory of Durkheim and comensurate with the theory of that of Merton, Specifically in the arson of industrial complex, it is revealed that one with revolutionary motive or revolting motive would do the arsonic act. For the policy of prevention of arsons, professional research work in organizational cooperation for preventive activities is conducted in municipal or city wise functions in the name of Parson Taskforces and beside a variety of research institutes in federal government have been operating effectively to countermeasure in many fields of research. Franch and Sweden beside the U.S. set up a overall operation of fire prevention research funtions and have obtained very successful result. Japan also put their research likewise for countermeasure. In this research as a way of preventive fire policy, first, it is necessary to accomodate the legal preventitive activities for fire prevention in judicial side and as an administrative side, (1) precise statistic management of crime of arson (2) establishment of professional research functions or a corporate (3) improvement of system for cooperative structural team for investigation of fires and menpower organization of professional members. Secondly, social mentality in individual prospect, recognition of fires by arson and youth education of such effect, educational program for development and practical promotion. Thirdly, in view of environmental side, the ways of actual performance by programming with the establishment of cooperative advancement in local social function elements with administrative office, habitants, school facilities and newspapers measures (2) establishment of personal protection where weak menpowers are displayed in special fire prevention measures. These measures are presented for prevention of crime of arson. The control of crime and prevention shall be prepared as a means of self defence by the principle of self responsibility Specifically arsonists usually aims at the comparatively weak control of fire prevention is prevalent and it is therefore necessary to prepare individual facilities with their spontaneous management of fire prevention instead of public municipal funtures of local geverment. As Clifford L. Karchmer asserted instead of concerns about who would commit arson, what portion of area would be the target of the arson. It is effective to minister spontaveously the fire prevention measure in his facility with the consideration of characteristics of arson. On the other hand, it is necessary for the concerned personnel of local goverment and groups to distribute to the local society in timely manner for new information about the fire prevention, thus contribute to effective result of fire prevention result. In consideration of these factors, it is inevitable to never let coincide with the phemonemon of arsons in similar or mimic features as recognized that these could prevail just an epedemic as a strong imitational attitude. In processing of policy to encounter these problems, it is necessary to place priority of city policy to enhancement of overall concerns toward the definitive essense of crime of arson.

  • PDF