• Title/Summary/Keyword: illegal activities

Search Result 123, Processing Time 0.02 seconds

A Field Survey on the Generation of Industrial Waste Oyster Shells and their Disposal Status (굴패각으로 인한 산업부산물 발생과 처리현황 실태조사)

  • Kim, Ji-Hyun;Song, Won-Ho;Moon, Hoon;Chung, Chul-Woo;Lee, Jae-Yong
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.11a
    • /
    • pp.146-147
    • /
    • 2013
  • The oyster shells of about 240,000 tons have been annually produced in south coast of South Korea. However, about 25% of the oyster shells (60,000tons) was recycled as oyster seeding and fertilizer due to the limited amount of consumption for such purposes. The stored amount of oyster shell in the fertilizer manufacturing company is overfilled, and thus cannot accept any more of the waste oyster shells. As a result, landfill and illegal dumping of waste oyster shells have become an increasingly serious issue since 2011. In this research, the problems generated by the oyster shells were investigated through surveying activities. One of the possible alternative solutions that can process large amount of waste economically was found to be the application of oyster shells as a construction materials.

  • PDF

Interest based-participation requiring accountability in greening

  • Park, Mi Sun
    • Forest Science and Technology
    • /
    • v.14 no.4
    • /
    • pp.169-180
    • /
    • 2018
  • The Republic of Korea (ROK) has had a successful experience in greening its land because of strong state policy and public participation. This paper aims to analyze the interest positions, participation, and accountability of multiple actors in the process of greening movements in the ROK. These movements were divided into two phases: forest rehabilitation (1973-1997) and urban greening (1998-2017). During the first phase, farmers caused deforestation by slash-and-burn farming and illegal logging, and governmental agencies acted as helpers controlled the farmers' deforestation activities. During the second phase, government agencies and enterprises caused deforestation with urban development projects, including construction of housings and roads. Multiple actors including citizens, NGOs, and enterprises helped urban greening through campaigns, donations, and monitoring. As a result, managing interest positions is significant to motivate multiple actors to participate in the greening movement. Participation with clear accountability is meaningful for successful greening. Therefore interest-based participation requiring accountability contributes to greening. This phenomenon indicates interconnection for interest positions, participation and accountability should be considered in designing greening policies.

Random Forest Classifier-based Ship Type Prediction with Limited Ship Information of AIS and V-Pass

  • Jeon, Ho-Kun;Han, Jae Rim
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.4
    • /
    • pp.435-446
    • /
    • 2022
  • Identifying ship types is an important process to prevent illegal activities on territorial waters and assess marine traffic of Vessel Traffic Services Officer (VTSO). However, the Terrestrial Automatic Identification System (T-AIS) collected at the ground station has over 50% of vessels that do not contain the ship type information. Therefore, this study proposes a method of identifying ship types through the Random Forest Classifier (RFC) from dynamic and static data of AIS and V-Pass for one year and the Ulsan waters. With the hypothesis that six features, the speed, course, length, breadth, time, and location, enable to estimate of the ship type, four classification models were generated depending on length or breadth information since 81.9% of ships fully contain the two information. The accuracy were average 96.4% and 77.4% in the presence and absence of size information. The result shows that the proposed method is adaptable to identifying ship types.

Exploring the Challenges and Strategies for Combating Advertising Fraud and Preserving Brand Reputation in the Korean Advertising Landscape

  • Seung-Chul Yoo;Yoontaek Sung
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.306-311
    • /
    • 2023
  • As digital advertising continues to dominate the advertising industry and experience substantial growth, associated criminal activities such as advertising fraud and brand safety risks have become increasingly prevalent. Despite the severity and extent of these crimes, the response in Korea has been lackluster, often perceiving them merely as losses in advertising expenses incurred by corporations. However, it is important to note that these issues have direct repercussions on the end-consumer in the form of increased prices for goods and services. Furthermore, illegal and intrusive advertisements not only cause inconvenience to the viewer, but may also indiscriminately target cognitively vulnerable groups, such as children and the elderly, with the intention of manipulating advertising metrics and artificially inflating performance indicators. In this study, we aim to explore the concept and significance of advertising fraud and brand safety, and to evaluate the current measures taken in the Korean market. Additionally, we will delve into the implications of related policies and emphasize the necessity of digital advertising literacy in addressing these issues.

Pirates in History and International Law Centering around the Viking Pirates (역사상 해적과 국제법상 해적 : 바이킹 해적을 중심으로)

  • Kim, Joo-Sik
    • Strategy21
    • /
    • s.30
    • /
    • pp.263-285
    • /
    • 2012
  • History, demonstrating convincingly that pirates have arisen continuously for a lengthy period of time throughout the world, is able to become a cooperative study of international law in terms of pirates matters ; Viking pirates. There are beneficial topics for the study of true nature of viking activities and the settlement of present pirates matters ; How were the pirates activities of Vikings, What sort of relations do they have between Vikings and other pirates which have arisen in world history, What are the differences compared to present concept of pirates. There were active pirates activities in the coast and waters of Scandinavia even before the period of the Migration Age because of geographical condition. With those experiences, Vikings began to ambush Britain Islands sailing across the North Sea since the late 8C, ages of migration in earnest. They ambushed all coasts of the European Continent expending boundary until the late of 11C. Pirate activities in a sort of guerrilla operations were operated when they encountered Islams in the Iberian Peninsula and the coast of North Africa. They showed twofold attitudes ; if the defence of the region and sea was weak, they plundered, or if strong, traded. In plundered europeans' position, Vikings were pirates with cruelty and barbarians. In vikings position, they were normal human beings who did a pirate activity to lead a better life. Viking pirates showed different characteristics in terms of three aspects ; area and aspect of action, activity after piracy. Meanwhile, Viking pirates showed several differences with pirates defined in terms of modern international law. Among the satisfying conditions of pirates, required by the international law of the sea, Vikings fulfilled animus furandi, desire for gain, activities for hatred and revenge, and private ends. Other conditions including attacking authority of the vessels, activities toward private ships, activities in the coast and the land, and illegal terroristic activities toward ships are found in viking pirates. However, Viking pirates do not show the activities in high seas and in the outside of a State's jurisdiction. In addition, it cannot be excluded that they pirated with vessels of regional leaders and the Sovereign, not private ships. Contrary to the definition of concept in terms of modern international law toward pirates, Viking invaded foreign waters, came on shore to foreign land and island, went up-stream the rivers to the back of interior, and attacked churches and abbeys. Strangely, they sometimes settled down in the places where they had pirated. Today, pirates appearing in history and defined in international law exist simultaneously and separately. It means, the historical nature and the nature under the international law are turning up differently. Historical cases of pirates should be reflected to modern international law. If so, it seems that the clue to solve pirate problems can be arranged. History is the immortal living thing, which not just existed as a past but reflects present.

  • PDF

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

A Study on Fisheries Resource Management Under the Rate Payment System - In Case of Large Trawl Fisheries - (비율(보합) 급제하에서 어업(자원)관리에 관한 연구 - 대형기선저인망어업을 중심으로 -)

  • Park Seong-Kwae
    • The Journal of Fisheries Business Administration
    • /
    • v.36 no.3 s.69
    • /
    • pp.1-24
    • /
    • 2005
  • Korean fishery wage system has been evolved with the different titles. However, Since the law of fishing crew was enacted in 1984, the fishery wage system has been established as a rate system, which is a legal term. The present rate system in practice shows various contents and modalities, depending on fisheries and regions, but the fisheries of large trawl cooperative employ a rate system of fixed plus rate wage. However, such change did not transform basically the properties of pure rate scheme. As well known, fishing vessel owners face an awful lot of difficulty in managing and controlling effectively the production process because fishing activities are carried out in the seas remote from the land. Thus, it tend to be inevitable for vessel owners to employ a rate system to induce fishermen's positive motivation for promoting productivity and saving operating costs. However, the rate system has worked out as a driving force, which induce an increase in production more strongly under the expansion of vessel numbers and power and the keener competition of fishing activities. Even though the control mechanism of fishing instruments are well established, fishermen become naturally to have an incentive to increase their fishing effort for maximizing production since they are able to raise their shares by maximizing the quantity harvested. Thus, as far as the rate system exists, fisheries administration may have much difficulty in realizing its fishery management goals only through vessel reduction and fishing gear regulations. Also, under the rate system fishery management authority may be in face of a serious dilemma between the spontaneous rate system and vessel reduction policy. If the realistic aspect of the rate system is recognized and resource restoration and profit promotion are main policy goals, it is necessary to develop effective ways to control vessel owners' and fishermen's production-maximizing motives at an appropriate level. From this point of view, it seems reasonable to introduce TAC system by species or by fisheries into the existing fishery system. The research results suggest that if the fisheries administration could understand clearly the spontaneous fisheries wage system, it would know the norm of TAC and the basic reasons for illegal fishing activities and thus it would be able to develop and implement more realistic resource management policies.

  • PDF

A Study on Private Investigator's Role against Digital Related Social Problems (디지털 관련 사회문제와 탐정의 역할)

  • Hur Myung Bum;Kim Kwon Ho;Yeom Keon Ryeong
    • Industry Promotion Research
    • /
    • v.8 no.4
    • /
    • pp.177-186
    • /
    • 2023
  • Modern society is operated based on the internet, wireless networks, and digital devices to the extent that it is called a digital society. In particular, as most of financial transactions, information movement, and commercial activities are based online, various social problems and side effects related to this are increasing rapidly. Representative examples include industrial espionage activities and leakage of industrial technology, and social problems such as illegal goods trade such as drugs using online and online gambling are increasing to a serious level. These digital-based social problems cannot be solved only by the activities and capabilities of judicial institutions such as police and prosecutors. Now that the private investigation market is open, active intervention using them is necessary. To this end, it is necessary to actively cultivate private investigator's ability to investigate and collect evidence in relation to digital social and criminal problems. In addition, each private investigation education institution or association should actively invest and research this.

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

A study on procedures of search and seize in digital data

  • Kim, Woon Go
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.