• Title/Summary/Keyword: illegal activities

Search Result 123, Processing Time 0.026 seconds

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

Development of the Integrative System to Categorize Damaged Areas for Participatory Restoration by Local Residents (주민참여형 복원을 위한 훼손지의 통합적 유형 구분 체계 개발)

  • Ahn, Tong Mahn;Kim, In Ho;Choi, Hyung Suk;Lee, Jae Young;Lee, Ji Young;Lee, Young;Ryu, Sun Jung;Min, So Young;Yoon, Min Ho
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.11 no.2
    • /
    • pp.87-103
    • /
    • 2008
  • Despite its high level of symbolic and ecological values, BaigDooDaeGahn, about 684km long stretch of mountains in the eastern part of Korean peninsular, has been widely destroyed and barely recovered. While Korean government enacted a special law in 2005 to protect these areas and designated about 2,658 $km^2$ as the protection zone in 2007, there were a number of sites inside that had been disturbed by mining, illegal crop cultivations, stone quarry, development of resort facilities, construction of roads, and other human activities. To restore these damaged areas in a sustainable manner, the integrative system to categorize damaged areas for participatory restoration by local residents was suggested by this study. The most distinguished feature of the proposed system was to integrate the existing restoration approach focusing on biophysical conditions into the sustainability-building approach to reactivate socio-economic conditions of local society, called 'restoration of eco-cultural community'. As an entry stage to design the new restoration system including processes and procedures, the damaged areas had to be re-categorized by two characteristics, their physical conditions in terms of possibility of public participatory restoration and the readiness of local society required for pursuing endogenous development. More detailed considerations regarding these two characteristics and three different categories has been suggested and discussed.

Director's Self-Dealing and Criminal Liability (주식회사(株式會社) 이사(理事)의 자기거래(自己去來)와 형사책임(刑事責任))

  • Lee, John-Girl;Kim, Pyung-Key
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.210-217
    • /
    • 2009
  • Discussions about unfavorable acts of corporations in managing activities include many legal considerations. In general cases, first of all, legality of the given acts should be verified. If they are judged to be illegal in their procedures, whether it is possible to assert nullification for the acts by the corporation law or not should be examined. Next, the claim for damages against the actors should be considered. After that, whether the actors have criminal liability or not should be discussed. In this case, it is difficult and complicated to judge what clauses of the Criminal Code in the substantive law apply to the unfavorable acts. when the director's business judgement in the long run causes the corporation to be unprofitable or suffer damage, the Question of whether criminal punishment can be imposed on the director is a very important one requiring careful consideration.

A Study on the Imposition of Sanctions on Illegal Use of Government R&D Expenses (정부연구개발비 유용행위 시 제재부가금에 관한 연구)

  • Noh, Sang-Kyun;An, Eun-Sook;Hyun, Byung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.854-862
    • /
    • 2018
  • The Government R&D budget for 2019 exceeded 20 trillion won in order to develop future growth market such as basic research investment and creation of growth engine. As such, the importance of R&D investment is increasing, and various schemes for enforcing efficient and transparent business expenses are being expanded. However, research expenses (Charge ratio) such as fraudulent execution of funds are continuously being generated, and a system of imposition of sanctions is being introduced. In this paper, the legal grounds of sanctions, comparative review of laws and regulations between the ministries, and the criteria of imposition (imputation) were analyzed. In addition, since the amendment of the standard for imposing the intergovernmental surcharges, a single standard has been applied, and the transition process of the surcharging system has been reviewed. As a result of the data analysis, it was found that they focused on micro - utility activities and suggested new policy measures corresponding to them. The Korea Academia-Industrial cooperation Society. The Korea Academia-Industrial cooperation Society.

Research on Jaywalking Characteristics of Elderly/Non-Elderly (고령자/비고령자의 무단횡단 특성에 관한 연구)

  • Hong, Kiman;Ha, Jungah;Kim, Jonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.543-555
    • /
    • 2021
  • Purpose: The purpose of this study is to analyze the walking characteristics of jaywalking pedestrians, which account for a large proportion of deaths in pedestrian traffic accidents. Method: As for the analysis method, after collecting data of jaywalking pedestrians using imaging equipment, frequency analysis and statistical verification were performed on the jaywalking characteristics of elderly and non-elderly people. Result: It was found that there was a difference in the characteristics of jaywalking between the elderly and non-elders, but in the case of walking speed, insignificant results were derived. However, it was found that among the elderly, the group having difficulty walking in general had a lower walking speed than the group that did not. Conclusion: It is judged that one of the causes of jaywalking is the perception of illegal activities and insensitivity to the risk of accidents, not the age and walking ability. Therefore, in addition to safety education, it is judged that it is necessary to provide pedestrian safety information that requires the driver's attention in multiple jaywalking sections.

Privacy Framework in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경내 개인정보보호 프레임워크 적용 방안)

  • Hong Seng-Phil;Lee Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.157-164
    • /
    • 2006
  • Information is playing a key role in sufficing the needs of individual members of the society in today's rapidly changing environment. Especially, the cases of illegal gathering of privacy information will increase and the leakage of privacy information will grow as the individual activities in the ubiquitous computing environment. In this paper, we suggested the privacy framework in order to make design and implementation of secure and effective privacy management system. Ant we also introduced the methodology which is represent to 5 specific stages in order to suggest to the privacy system development guideline from the standpoints of the privacy system operator or developer. Especially, we tried to determine whether the suggested methodology can be effectively used in the real computing environment or not by making necessary investments in management (privacy policy) and technical (system architecture) sides. We believe that the privacy framework and methodology introduced in this research can be utilized to suggest new approach for showing direction from the privacy protection perspective, which is becoming more important in ubiquitous environments, and practical application rather than providing conceptual explanation from the views of engineer or developer.

Analysis of Chemical Compounds of Gaseous and Particulate Pollutants from the Open Burning of Agricultural HDPE Film Waste

  • Kim, Tae-Han;Choi, Boo-Hun;Kook, Joongjin
    • Journal of People, Plants, and Environment
    • /
    • v.24 no.6
    • /
    • pp.585-593
    • /
    • 2021
  • Background and objective: Illegal open-air incineration, which is criticized as a leading source of air pollutants among agricultural activities, currently requires constant effort and attention. Countries around the world have been undertaking studies on the emission of heavy metal substances in fine dust discharged during the incineration process. A precise analytical method is required to examine the harmful effects of particulate pollutants on the human body. Methods: In order to simulate open-air incineration, the infrastructure needed for incineration tests complying with the United States Environmental Protection Agency (EPA) Method 5G was built, and a large-area analysis was conducted on particulate pollutants through automated scanning electron microscopy (SEM)-energy-dispersive X-ray spectroscopy (EDS). For the test specimen, high-density polyethylene (HDPE) waste collected by the DangJin Office located in Choongcheongnam-do was used. To increase the identifiability of the analyzed particles, the incineration experiment was conducted in an incinerator three times after dividing the film waste into 200 g specimens. Results: Among the metal particulate matters detected in the HDPE waste incineration test, transition metals included C (20.8-37.1 wt%) and O (33.7-37.9 wt%). As for other chemical matters, the analysis showed that metal particulate matters such as metalloids, alkali metals, alkaline earth metals, and transition metals reacted to C and C-O. Si, a representative metalloid, was detected at 14.8-20.8 wt%, showing the highest weight ratio except for C and O. Conclusion: In this study, the detection of metal chemicals in incinerated particulate matters was effectively confirmed through SEM-EDS. The results of this study verified that HDPE waste adsorbs metal chemicals originating from soil due to its own properties and deterioration, and that when incinerated, it emits particulate matters containing transition metals and other metals that contribute to the excessive production and reduction of reactive oxygen species.

Darknet Traffic Detection and Classification Using Gradient Boosting Techniques (Gradient Boosting 기법을 활용한 다크넷 트래픽 탐지 및 분류)

  • Kim, Jihye;Lee, Soo Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.371-379
    • /
    • 2022
  • Darknet is based on the characteristics of anonymity and security, and this leads darknet to be continuously abused for various crimes and illegal activities. Therefore, it is very important to detect and classify darknet traffic to prevent the misuse and abuse of darknet. This work proposes a novel approach, which uses the Gradient Boosting techniques for darknet traffic detection and classification. XGBoost and LightGBM algorithm achieve detection accuracy of 99.99%, and classification accuracy of over 99%, which could get more than 3% higher detection accuracy and over 13% higher classification accuracy, compared to the previous research. In particular, LightGBM algorithm could detect and classify darknet traffic in a way that is superior to XGBoost by reducing the learning time by about 1.6 times and hyperparameter tuning time by more than 10 times.

Korea's Strategy for Participating in Arctic Biodiversity International Cooperation Projects (한국의 북극 생물다양성 국제협력사업 참여 전략)

  • Sung-Ryong Kang;Jihyun Yoon;Inyoung Jang
    • Korean Journal of Ecology and Environment
    • /
    • v.55 no.4
    • /
    • pp.390-397
    • /
    • 2022
  • Conservation of Arctic Flora and Fauna (CAFF) is the biodiversity working group of the Arctic Council. CAFF conducts Monitoring, Assessment, Policy, and expert group activities to preserve Arctic biodiversity and ensure the sustainability of biological resources and communicates the results to governments and indigenous peoples. The main tasks of CAFF consist of monitoring (Circumpolar Biodiversity Monitoring Program), assessment (Arctic Biodiversity Assessment) and strategic projects(Arctic Migratory Bird Initiative, AMBI). Korea has been directly participating in the AMBI since 2015 after acquiring observer status of the Arctic Council in 2013. The AMBI aims to preserve habitats on migration routes used by breeding birds in the Arctic and prevent illegal hunting. Thus, observer countries on migratory routes are directly participating in the project. When selecting priorities for participation in Arctic cooperation projects by 2030, Korea should consider continuing participation in AMBI and participating in the "CAFF Youth Program" in connection with the Arctic Academy program operated by Korea's public institutes.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.