• Title/Summary/Keyword: criminal code

Search Result 42, Processing Time 0.021 seconds

A Development of the Control System of the Computer Numerical Controlled Milling Machine for the Automobile Inside Keys (컴퓨터 수치제어 자동차용 인사이드 키(Inside Key) 가공기 제어장치 개발)

  • Lim, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 1998.07b
    • /
    • pp.672-674
    • /
    • 1998
  • Inside keys for the automobiles are the keys whose key teeth are engraved on the inside of the keys. These types of the keys are very effective in prohibiting making the copies of the keys for the criminal purposes and have excellent mechanical strenth comparing with the ordinary types of the keys. In this paper, a development of the control system for the milling machine which is used for cutting the teeth of the inside keys. This machine is controlled by a computer and the cutting is done automatically according to the key codes which are contained in the key code file. This work is presented to show an example of the industry-university cooperation.

  • PDF

Learning from the Licensing and Training Requirements of the USA Private Security Industry : focused on the Private Security Officer Employment Authorization Act & California System (미국의 민간경비 자격 및 교육훈련 제도에 관한 연구 - 민간경비원고용인가법(PSOEAA) 및 캘리포니아 주(州) 제도 중심으로 -)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.197-228
    • /
    • 2012
  • The private security industry in Korea has rapidly proliferated. While the industry has grown quickly, though, private security officers have recently been implicated in incidents involving violence, demonstrating an urgent need for systematic reform and regulation of private security practices in Korea. Due to its quasi-public service character, the industry also risks losing the public's favor if it is not quickly disciplined and brought under legitimate government regulation: the industry needs professional standards for conduct and qualification for employment of security officers. This paper shares insights for the reform of the Korean private security industry through a study of the licensing and training requirements for private security businesses in the United States, mainly focusing on the Private Security Officer Employment Authorization Act (hereinafter the PSOEAA) and the California system. According to the PSOEAA, aspiring security officers shall submit to a criminal background check (a check of the applicants' criminal records). Applicants' criminal records should include not only felony convictions but also any other moral turpitude offenses (involving dishonesty, false statement, and information on pending cases). The PSOEAA also allows businesses to do background checks of their employees every twelve months, enabling the employers to make sure that their employees remain qualified for their security jobs during their employment. It also must be mentioned that the state of California, for effective management of its private security sector, has established a professional government authority, the Bureau of Security and Investigative Services, a tacit recognition that the private security industry needs to be thoroughly, professionally, and actively managed by a professional government authority. The American system provides a workable model for the Korean private security industry. First, this paper argues that the Korean private security industry should implement a more strict criminal background check system similar to that required by the PSOEAA. Second, it recommends that an independent professional government authority be established to oversee and enforce regulation of Korea's private security industry. Finally, this article suggests that education and training course be implemented to provide both diverse training as well as specialization and phasing.

  • PDF

The Computer Monitor's Image Evaluated at The Target of The Falsification According to The New Conception of The Falsification Made by Regarding the Reproduced Document as The Document of Document crime (복사문서의 문서간주가 창출한 새로운 변조개념에 의해 문서변조행위대상으로 평가되는 컴퓨터모니터 이미지)

  • Ryu, Seok-Jun
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.725-756
    • /
    • 2013
  • In this paper, the possibility of extension of falsification conception was investigated to discuss the validity of this precedent. Consequently this extension was indispensible according to the article 237-2 of criminal code which regards the reproduced document as the document in the document crime. However, this is against the security of human right. On the contrary, there is not this kind of article in the German criminal code and the German precedents and majority theory are negative to regard it as the criminal document. And also, there is the pont of view that the reproduced document is not the criminal document because it's not the expression itself of document nominee's intention, so the article 237-2 should be demolished in Korea. According to this opinion, the serious reconsideration should be required in the legislation of this article 237-2. Nevertheless, if this extended conception is needed and it's possible, the meaning of the computer monitor's image is not able to be ignored in the conception of falsification. Therefore this should be regarded as the element of the falsification conception. In other words, this can't be evaluated as the object of falsification but the target of falsification, according to the conception extension, though the precedents do not regard it as the document in document crime.

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot (악성 Bot에 대한 악성코드 분석을 통한 탐지 및 대응방안)

  • Kim, Soeui;Choi, Duri;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.199-207
    • /
    • 2013
  • Recently, hacking is seen as a criminal activity beyond an activity associated with curiosity in the beginning. The malignant bot which is used as an attack technique is one of the examples. Malignant Bot is one of IRC Bots and it leaks user's information with attacker's command by attacking specified IP range. This paper will discuss an access method and a movement process by analyzing shadowbot which is a kind of a malignant Bot and will suggest possible countermeasure. This study has two distinct features. First, we analyze malignant Bot by analyzing tools such as VM ware. Second, we formulate a hypothesis and will suggest possible countermeasure through analyzing malignant Bot's access method and movement. Performance evaluation will be conducted by applying possible countermeasure to see if it can prevent attacks from malignant bot.

Detection of Personal Information Leakage using the Network Traffic Characteristics (네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법)

  • Park, Jung-Min;Kim, Eun-Kyung;Jung, Yu-Kyung;Chae, Ki-Joon;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.199-208
    • /
    • 2007
  • In a ubiquitous network environment, detecting the leakage of personal information is very important. The leakage of personal information might cause severe problem such as impersonation, cyber criminal and personal privacy violation. In this paper, we have proposed a detection method of personal information leakage based on network traffic characteristics. The experimental results indicate that the traffic character of a real campus network shows the self-similarity and Proposed method can detect the anomaly of leakage of personal information by malicious code.

The problem point and improvement program of the scene search and seizure of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2595-2601
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.

The problem point and improvement program of the scene confiscation search of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.118-122
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.his is an example of ABSTRACT format.

  • PDF

Criminal Liabilities of Ghost Surgery (유령수술행위의 형사책임 - 미용성형수술을 중심으로 -)

  • Hwang, Manseong
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.27-53
    • /
    • 2015
  • Recently, a plastic surgery hospital in Seoul, has been raided following suspicions that ghost surgery was performed by an unauthorized substitute surgeon on a chinese woman who lapsed into a death. Following the incident, an organization to eradicate ghost surgery was created in March by Consumers Korea, founded to protect consumer rights, and the Korea Alliance of Patients Organization. The organization has received reports of illegal medical practices. To substitute another physician without the patient's consent and without his knowledge of the substitution is fraud and deceit and a violation of a basic ethical concept. The patient as a human being is entitled to choose his own physician and he should be permitted to acquiesce in or refuse to accept the substitution. It should be noted that it is the operating surgeon to whom the patient grants his consent to perform the operation. The patient is entitled to the services of the particular surgeon with whom he contracts. The surgeon, in accepting the patient, obligates himself to utilize his personal talents in the performance of the operation to the extent required by the agreement creating the physician-patient relationship. He cannot properly delegate to another the duties which the patient authorizes him to perform personally. 'Ghost surgery' comes under Article 257(Inflicting Bodily Injury on Other or on Lineal Ascendant) of the Criminal Code. Substitution another physician without the patient's consent and without his knowledge of the substitution shall be performed Inflicting Bodily Injury. This is a controversial issue that'ghost surgery' comes under Article 347(Fraud) of the Criminal Code. It maybe controversial that operation substituted by another physician without the patient's consent and without his knowledge of the substitution becomes the component of Fraud. Also, Ghost surgery' comes under Article 27 (Prohibition of Unlicensed Medical Practice, etc.), Article 22 (Medical Records, etc.), Article 33 (Establishment) of the Medical Service Act. The surgeon's obligation to the patient requires him to perform the surgical operation: (1) within the scope of authority granted him by the consent to the operation; (2) in accordance with the terms of the contractual relationship; (3) with complete disclosure of all facts relevant to the need and the performance of the operation; and (4) to utilize his best skill in performing the operation.

  • PDF