• Title/Summary/Keyword: data and information security

Search Result 4,499, Processing Time 0.037 seconds

A Study on the Violation of Probation Condition Determinants between Sex Offenders and Non-Sex Offenders (성범죄자와 일반범죄자의 보호관찰 경고장 관련 요인 비교)

  • Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.205-230
    • /
    • 2015
  • This study aims to compare the differences of crucial factors that are associated with probation warning tickets between sex offenders and non-sex offenders in South Korea. Serious high-profile cases have occurred in recent years which resulted in public and political conners for successful sex offender management and monitoring strategy through community corrections. The official response has been to initiate a series of legislative probation and parole measures by using GPS electronic monitoring system, chemical castration, and sex offender registry and notification. In this context, the current study is designed to explore the major factors that could affect the failure of probation by comparing the differences between sex offenders and non-sex offenders in terms of their major factors which are related to the failure of probation. The failure of probation is measured by the number of warning tickets which would be issued when there is the violation of probation conditions. The data is obtained from Seoul Probation office from January, 29, 2014 to February, 28, 2014. The sample number of sex offenders is 144 and the number of non-sex offenders is 1,460. The data includes the information regarding the offenders who completed their probation order after they were assigned to Seoul Probation in 2013. Furthermore, this study uses the chi-square and logistic regression analysis by using SPSS statistical package program. The result demonstrated that only prior criminal history was statistically significant factor that was related to the number of warning tickets in the sex offender group when other variables were controlled($X^2=25.15$, p<0.05, Nagelkerke $R^2=0.23$)(b=0.19, SE=0.08, p<0.05). By contrast, there were various factors that were associated with the number of warning tickets in non-sex offender group. Specifically, the logistic regression analysis for the non-sex offenders showed that demographic variable(marital status and employment type), offender-victim relationships, alcohol addiction, violent behavior, prior criminal history, community service order, and attendance order were statistically significant factors that were associated with the odds of warning tickets. Further policy implication will be discussed.

  • PDF

Probabilistic Prediction of the Risk of Sexual Crimes Using Weight of Evidence (Weight of Evidence를 활용한 성폭력 범죄 위험의 확률적 예측)

  • KIM, Bo-Eun;KIM, Young-Hoon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.72-85
    • /
    • 2019
  • The goal of this study is to predict sexual violence crimes, which is an routine risk. The study used to the Weight of Evidence on sexual violence crimes that occurred in partly Cheongju-si for five years from 2011 to 2015. The results are as follows. First, application and analysis of the Weight of Evidence that considers the weight of evidence characteristics showed 8 out of total 26 evidences that are used for a sexual violence crimes risk prediction. The evidences were residential area, date of use permission for building, individual housing price, floor area ratio, number of basement floor, lot area, security light and recreational facility; which satisfied credibility in the process of calculating weight. Second, The weight calculated 8 evidences were combined to create the prediction map in the end. The map showed that 16.5% of sexual violence crimes probability occurs in 0.3㎢, which is 3.3% of the map. The area of probability of 34.5% is 1.8㎢, which is 19.0% of the map and the area of probability of 75.5% is 2.0㎢, which is 20.7% of the map. This study derived the probability of occurrence of sexual violence crime risk and environmental factors or conditions that could reduce it. Such results could be used as basic data for devising preemptive measures to minimize sexual violence, such as police activities to prevent crimes.

Students' Expectation for Specialized Subjects Teacher's Role of Technical High School (공업계 고등학교 전문교과 교사의 역할에 대한 학생들의 기대)

  • Lee, Myung-Hun
    • 대한공업교육학회지
    • /
    • v.40 no.2
    • /
    • pp.22-43
    • /
    • 2015
  • The purpose of this study was to analyze students' expectation for specialized subjects teacher's role of technical high school. The study was carried out through questionnaire survey method. A survey questionnaire was developed by researcher to collect the information needed for the study. It consists of 15 items. 428 questionnaires were used for analysis. A chi squared test was used for data analysis. Major findings of this study were as follows: First, when specialized subjects teachers lecture major theory subject classes, students of technical high school wanted it to be according to their level. Their practical class preference differed depending on their department. For the security guidance method during practical class, students most wanted teachers constantly instructing in class. Second, students of technical high school wanted their teachers to pay attention to personality guidance during student life guidance & counseling time. They hoped that teachers would not discriminate towards wrong doings. Also students wanted career the most as a counseling topic and expected a guidance role from teachers. Third, students of technical high school wanted teachers to work hard to create a harmonious class atmosphere when managing a class. They wanted teachers to have affection for class and students. They wanted teachers making jokes easily with students to get friendly. Fourth, students of technical high school hoped 'employment and entrance higher grade school' the most as a career guidance topic. They wanted teachers to consider their aptitude when they were counseling about finding a job and wanted to learn more about job information during employment instructions.

Cost-benefit Analysis of Installing Crime Preventive CCTV: Focused on Theft and Assault (범죄예방용 CCTV설치의 비용편익분석: 절도와 폭력범죄를 중심으로)

  • Yun, Woo-Suk;Lee, Chang-Hun;Shim, Hee-Sub
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.209-237
    • /
    • 2017
  • Theories on 'opportunity for crime' have utilized CCTV in crime prevention approach, and empirical studies showing crime prevention effects of CCTV have supported expansion of CCTV installation. Particularly, in Korea, the number of CCTV installation had tripled from 2011 to 2015, and governmental policies regarding CCTV have become one of the mainstream social control strategies. Although a couple of empirical studies showed decrease in crime rate due to CCTV installation, there is no study investigating B/C analysis(Benefit vs. cost analysis) of CCTV installation. B/C analysis results will be beneficial for official decision-making of criminal justice policy, and this study is purported to produce such fundamental evidence for policy making procedure. To fulfill this goal, this study collected data on financial information, crime data between 2011 and 2015 across the nation from 232 governmental district offices and the Korean National Police. This study then conducted two different B/C analyses(simple B/C analysis, regression-based B/C analysis). The simple B/C analysis results showed that 1) total costs for CCTV installation in 2014 was 68,626,000,000 won(approximately, US$57,188,333.00, money exchange rate 1200won=US$1), 2) benefits of crime reduction was 90,888,000,000 won(appx. US$75,740,000), and 3) B/C rate was 1.32. The regression-based B/C analysis results showed that 1) B/C rate was 1.52 when only reduced costs of criminal justice processes for crime employed, and 2) B/C rate was 3.62 when overall social costs including reduced costs of criminal justice processes and social benefits, e.g., reduction in costs for managing fear of crime, due to the crime reduction. Based on the results, this study provided policy implications.

  • PDF

A Study on the Practice of Performance Assessment in the Elementary School Mathematics - Focussing on Self-assessment and Peer-observation - (초등학교 수학과 수행평가 실천에 관한 연구 - 자기평가.동료평가.관찰평가를 중심으로 -)

  • Kim Song-Ja;Choi Chang-Woo
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.10 no.1
    • /
    • pp.67-87
    • /
    • 2006
  • This study is to recognize a problem in the practice of performance assessment in elementary school, and to find out some suggestive points for improvement of teaching·learning method in elementary mathematics through assessment by reducing time restriction according to assessment through the practice of self-assessment, peer-assessment and observation, and then by reflecting the results of assessment on teaching learning plan. For that, the questions of study set up are as follows ; 1. How should self-assessment and peer-assessment be applied to in elementary mathematics assessment? 2. How should the time for 'let's play an interesting game' be managed for assessment of elementary mathematics? 3. How should the results of assessment be reflected on the Process of teaching and learning of mathematics? To solve these problems, a researcher of this thesis performed self-assessment, peer-assessment on 40 students of second grade under her charge as a class teacher, and applied observation in the time management process for 'let's play an interesting game' for a semester. self-assessment was made by mathematics journal, self-assessment chart, peer-assessment was by the analysis of conversation record among students in the situations of assessment, and observation was by observation of activity when playing with the results data of play analyzed. the concrete methods of application as follows ; First, mathematics journal was applied $1{\sim}2$ times by each unit with reconstruction into the level of second grade on the basis of the preceding-study models. Second, peer-assessment was applied to the unit-assessment time and the play-activities time by the method of recording·analyzing the contents of conversation among students in the process of assessment. Third, mathematical attitude & dispositions of students making use of the self- assessment table were examined referring to the teaching learning plan. Fourth, the time management for 'let's play an interesting game' was made through the prior recognition of play method and the joyful play-activities by use of the play-plate. Assessment depended on analysis of play-activities results of students making use of an observation form. Fifth, the results of self-assessment, peer-assessment, and observation were analyzed, and then they were made use of as self-observation data, of teacher her/his self, or teaching·learning improvement data. Students' self-assessment datum (mathematics diary, self-assessment sheets, conversation contents in the process of assessment) and observation materials (check lists, Play-activity result materials, conversation contents in the process of play) obtained in the process of application was analyzed as follows ; 1. From the practice of self-assessment in form of mathematics journal, I could obtain not only datum showing how much students was understanding the learning aims by unit time and to any degree they reached but also information about their response to learning datum and favorable type of learning. 2. Assessment by self-assessment chart was useful in planning the mathematics teaching learning process because it helps ascertain mathematical attitude & dispositions of students. 3. Through the application of peer-assessment, students had the opportunity of communicating with other students looking back on his/her explaining process, and teachers could obtain basic materials for assessment of students. 4, In case of time management for 'let's play an interesting game', there was natural extension of play made through time-security by prior looking into the method of play-activity, and then, for a remained time, by making children play a new game. 5, I could easily record the activities of students by use of the observation. form, and make use of it as basic data for descriptive assessment. 6, Each kinds of data obtained from the results of assessment was helpful for securing self-observation materials in the process of teaching learning and for their betterment in mathematics subject. However, because they were in the second grade of elementary school and there was an individual difference, some students could not make use of mathematics diary or self-assessment form properly. In case of these students, assessment data would be obtained through interview or observation. And for effective operation of play, its purpose & method and matters that demand special attention when play-acting should be clearly guided. Also, when applying an effective play in addition to play activities in textbook, to lessons, interesting mathematics lessons could be guided.

  • PDF

A Distributed Altruistic Locking Scheme For Multilevel Secure Database in Wireless Mobile Network Environments (무선 이동 네트워크 환경에서 다단계 보안 데이터베이스를 위한 분산 이타적 잠금 기법)

  • Kim, Hee-Wan;Park, Dong-Soon;Rhee, Hae-Kyung;Kim, Ung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.235-242
    • /
    • 2002
  • We propose an advanced transaction scheduling protocol for concurrency control of multilevel secure databases in wireless mobile network environment. Wireless communication is characterized by frequent spurious disconnections. So short-lived transaction must quickly access database without any delay by long-lived one. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure databases in wireless mobile network environment. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of a1truism has also been deployed for extended a1truistic locking. This is in a way that scope of data to he early released is enlarged to include even data initially not intended to be donated. Our protocol is based on extended altruistic locking, but a new method, namely bi-directional donation locking for multilevel secure databases (MLBiDL), is additionally used in order to satisfy security requirements and concurrency. We showed the Simulation experiments that MLBiDL outperforms the other locking protocols in terms of the degree of throughput and average waiting time.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

Open Digital Textbook for Smart Education (스마트교육을 위한 오픈 디지털교과서)

  • Koo, Young-Il;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.177-189
    • /
    • 2013
  • In Smart Education, the roles of digital textbook is very important as face-to-face media to learners. The standardization of digital textbook will promote the industrialization of digital textbook for contents providers and distributers as well as learner and instructors. In this study, the following three objectives-oriented digital textbooks are looking for ways to standardize. (1) digital textbooks should undertake the role of the media for blended learning which supports on-off classes, should be operating on common EPUB viewer without special dedicated viewer, should utilize the existing framework of the e-learning learning contents and learning management. The reason to consider the EPUB as the standard for digital textbooks is that digital textbooks don't need to specify antoher standard for the form of books, and can take advantage od industrial base with EPUB standards-rich content and distribution structure (2) digital textbooks should provide a low-cost open market service that are currently available as the standard open software (3) To provide appropriate learning feedback information to students, digital textbooks should provide a foundation which accumulates and manages all the learning activity information according to standard infrastructure for educational Big Data processing. In this study, the digital textbook in a smart education environment was referred to open digital textbook. The components of open digital textbooks service framework are (1) digital textbook terminals such as smart pad, smart TVs, smart phones, PC, etc., (2) digital textbooks platform to show and perform digital contents on digital textbook terminals, (3) learning contents repository, which exist on the cloud, maintains accredited learning, (4) App Store providing and distributing secondary learning contents and learning tools by learning contents developing companies, and (5) LMS as a learning support/management tool which on-site class teacher use for creating classroom instruction materials. In addition, locating all of the hardware and software implement a smart education service within the cloud must have take advantage of the cloud computing for efficient management and reducing expense. The open digital textbooks of smart education is consdered as providing e-book style interface of LMS to learners. In open digital textbooks, the representation of text, image, audio, video, equations, etc. is basic function. But painting, writing, problem solving, etc are beyond the capabilities of a simple e-book. The Communication of teacher-to-student, learner-to-learnert, tems-to-team is required by using the open digital textbook. To represent student demographics, portfolio information, and class information, the standard used in e-learning is desirable. To process learner tracking information about the activities of the learner for LMS(Learning Management System), open digital textbook must have the recording function and the commnincating function with LMS. DRM is a function for protecting various copyright. Currently DRMs of e-boook are controlled by the corresponding book viewer. If open digital textbook admitt DRM that is used in a variety of different DRM standards of various e-book viewer, the implementation of redundant features can be avoided. Security/privacy functions are required to protect information about the study or instruction from a third party UDL (Universal Design for Learning) is learning support function for those with disabilities have difficulty in learning courses. The open digital textbook, which is based on E-book standard EPUB 3.0, must (1) record the learning activity log information, and (2) communicate with the server to support the learning activity. While the recording function and the communication function, which is not determined on current standards, is implemented as a JavaScript and is utilized in the current EPUB 3.0 viewer, ths strategy of proposing such recording and communication functions as the next generation of e-book standard, or special standard (EPUB 3.0 for education) is needed. Future research in this study will implement open source program with the proposed open digital textbook standard and present a new educational services including Big Data analysis.

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.

Evaluating of the Effectiveness of RTK Surveying Performance Based on Low-cost Multi-Channel GNSS Positioning Modules (다채널 저가 GNSS 측위 모듈기반 RTK 측량의 효용성 평가)

  • Kim, Chi-Hun;Oh, Seong-Jong;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.53-65
    • /
    • 2022
  • According to the advancement of the GNSS satellite positioning system, the module of hardware and operation software reflecting accuracy and economical efficiency is implemented in the user sector including the multi-channel GNSS receiver, the multi-frequency external antenna and the mobile app (App) base public positioning analysis software etc., and the multichannel GNSS RTK positioning of the active configuration method (DIY, Do it yourself) is possible according to the purpose of user. Especially, as the infrastructure of multi-GNSS satellite is expanded and the potential of expansion of utilization according to various modules is highlighted, interest in the utilization of multi-channel low-cost GNSS receiver module is gradually increasing. The purpose of this study is to review the multi-channel low-cost GNSS receivers that are appearing in the mass market in various forms and to analyze the utilization plan of the "address information facility investigation project" of the Ministry of Public Administration and Security by constructing the multi-channel low-cost GNSS positioning module based RTK survey system (hereinafter referred to as "multi-channel GNSS RTK module positioning system"). For this purpose, we constructed a low-cost "multi-channel GNSS RTK module positioning system" by combining related modules such as U-blox's F9P chipset, antenna, Ntrip transmission of GNSS observation data and RTK positioning analysis app through smartphone. Kinematic positioning was performed for circular trajectories, and static positioning was performed for address information facilities. The results of comparative analysis with the Static positioning performance of the geodetic receivers were obtained with 5 fixed points in the experimental site, and the good static surveying performance was obtained with the standard deviation of average ±1.2cm. In addition, the results of the test point for the outline of the circular structure in the orthogonal image composed of the drone image analysis and the Kinematic positioning trajectory of the low cost RTK GNSS receiver showed that the trajectory was very close to the standard deviation of average ±2.5cm. Especially, as a result of applying it to address information facilities, it was possible to verify the utility of spatial information construction at low cost compared to expensive commercial geodetic receivers, so it is expected that various utilization of "multi-channel GNSS RTK module positioning system"