• Title/Summary/Keyword: secret methods

Search Result 170, Processing Time 0.029 seconds

Analysis of the Case with Serial Killer Young Cheol Yoo (유영철 연쇄살인사건 분석)

  • Lee, Jin-Dong;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.32-51
    • /
    • 2007
  • Serial violent crimes have occurred more frequently. Additional attention is paid to relevant areas in which discussions has also increased. This study analyzed Young-cheol Yoo, serial killer case. Two of Yoo's crimes were studied for modus operandi. The cases selected were the premeditated break-in homicide of upper-class elderly people and the impulsive homicide of the Hwanghak-Dong street vendor. Crime motives, targets, times, places, means and methods were analyzed. Profiling techniques in Young-cheol Yoo cases were evaluated and the problems discovered during investigation were discussed. The followings are the findings of the analysis of the serial killer Yoo cases. Yoo exhibited a hatred toward the rich, the elderly, and women as well as a fear of diseases and death. Yoo's crime targets were the elderly residing in wealthy houses, street vendors and prostitutes. The numbers of victims were: 3 men and 5 women victims in 4 homicide cases involving the elderly residents in wealthy houses; one man in 1 street vendor homicide case 11 women in 11 prostitute homicide cases, so total 20 persons were murdered in 16 cases. The time of the crimes were between 10 am and noon in the homicide cases of the elderly and very late at night or early in the morning in the prostitute homicide cases. Means and methods facilitated include the use of a knife as a threat and a hammer made by Yoo to strike the head and face of victims. In the homicide cases involving the elderly, he attempted to disguise the crime scene as a burglary or committed arson to destroy the evidence; in the prostitute homicide cases, bodies were mutilated and buried in secret. 1) Generally each serial killer case has different characteristics, motives, and purposes; while some serial killer cases involve similar methods, others use different methods. Unlike other crimes, serial killers' characteristics and tastes are very different, so it is difficult to explain serial killings based on a specific model. It is important to accurately capture modus operandi of each serial killing and for detectives to familiarize themselves with them. The process of tracing and use of imagination which follows a serial killer's psychology and thought must be used to find out what kind of thoughts pushed the killer to commit the crime. In order to investigate and research difficult subjects such as serial killing, various methods, skills, and relevant knowledge should be studied, and institutional endeavors should go hand in hand with individual efforts.

  • PDF

A Study of Ethical Sense of Value and Discord of the Clinical Nurse (임상간호사(臨床看護師)의 윤리적(倫理的) 가치관(價値觀)과 윤리적(倫理的) 갈등(葛藤)에 관한 연구(硏究))

  • Jong, Heui-Ja;Moon, Heui-Ja
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.1 no.2
    • /
    • pp.349-371
    • /
    • 1995
  • Professional nurse shall possess the firm nursing idea and ethical nursing philosophy based on the professional knowledge and technology but due to the rapid social situations has changed the value to man thus the nurse's sense of value in the nursing secenes has been confused and changed bringing the new ethical problems and discord due to the ethically difficult problems. This study is aimed to know about the discord between the ruling ethical sense of value and the ethical discord exeriencing in the clinical scenes of the nurse and to help them establish affirmative ethical sense of value and provide them with the materials which can effectively meet the ethical discord. The study research has been conducted by selecting 515 clinical nurses in 8 general hospitals as the subject from Mar. 13, 1995 to Apr. 3. The tool measuring the ethical sense of value disigned by Lee, Young Sook has been used and supplemented and the tool measuring the ethical discord was the question papers about the ethical dillemma of Han, Sung Sook. The collected materials have been analyzed by the statistical methods of arithmetical everage, t-test, ANOVA, Pearson's Correlation Coefficient and etc. The result of the study is as the below ; 1) The average point of the ethical sense of value of the nurse was 3.62(maximum point : 5) which showed that the ethical level was so high and the highest question item in the ethical level of the whole items of the ethical sense of value was "They conduct as directed by the doctor in case the disposition of the doctor looks mistaken"(4.56 point), "They keep the secret of the patients while serving them."(4.56) and the lowest item was "using placobo for the patients is not allowed" : (1.85 point). 2) Statistical variation which showed the significant difference in the relation with the ethical sense of value according to the general characters of the nurse has shown as scholarly years(F=3.47, p=.016), religion(F=1.66, p=.004), interest degree of ethical education(F=4.18, p=.006),attitude to the job of nursing(F=6.76, p=.006), ethical standard(F=3.28, p=.021), and recognition degree on ethical principles(F=4.53, p=.001). 3) The average point of the ethical discord of the nurse was 0.54(The maximum-1 point) point and the ethical discord in the clinical scenes : "the problems arising from the lack of manpower of the nurse"(0.86), "the discord from the uncooperative relation between them and the medical staff and"(0.75) and indifference of the doctor about the report of the nurse(0.73). 4) The variation which showed the significant difference statistically in the ethical discord according to the general characters of the nurse was that Age(F=19.88, p=.000), schooling(F=5.32, p=.001), Experience(F=15.77, p=.000), position(F=13.58, p=.000) and ethical standard(F=2.63, p=.049). 5) The results of the analysis of correlation between ethical sense of value and discord(r=0.519, p=.239) showed no significant correlation statistically.

  • PDF

The Morphology Study of Organ Surface BongHan Ducts and Corpuscle (장기표면의 내외봉한관과 봉한소체의 형태학적 관찰)

  • Ahn, Seong-Hun;Kim, Min-Su;Lee, Sang-Hun;Kwon, O-Sang;Kim, Jae-Hyo;Soh, Kwang-Sup;Sohn, In-Chul
    • Korean Journal of Acupuncture
    • /
    • v.26 no.1
    • /
    • pp.79-84
    • /
    • 2009
  • Objective : In 1960's Bonghan Kim's team found BongHan(BH) ducts which were presumed as acupuncture meridians and BH corpuscles. They asserted Bonghan theory and SanAl theory which was involved in cell division and cell restoration. However, many other experiments which had been operated to demonstrate and find the existence of BH ducts had failed because of the secret of blue stain drugs. During the last several years, BongHan theory has been revived through experimental researches to find the anatomical structures of BH ducts and corpuscles by Soh's Biomedical Physics Lab. Soh's research team used the staining with Janus Green B, Alcian blue, nanoparticles and Acridine Orange. We used DAPI staining to find the existence of BH ducts and the corpuscles and to observe nuclear arrangement. Methods : We used japan white rabbits as experimental animals. BH ducts and corpuscles were stained with DAPI. The nucleus configuration in BH ducts stained with DAPI were observed with microscope. Results : In this study, we found thread like structures in silver white color distinguished from the blood vessels, nerves and lymph vessels. These thread like vessels in the linear duct shape were connected to same colored mass in the ball shape. Thread like structures we found could be separated easily from the surrounding other organ mass. The nuclei of the thread like structure in DAPI staining, are about 10${\sim}$20${\mu}m$ length, in rod shape and linear arrangement. Conclusion : We concluded that the thread like structure we found was same vessel reported by Soh's research team, BongHan ducts and corpuscle.

  • PDF

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

Cultivation of Cauliflower Mushroom (Sparassis crispa) Using Coniferous Sawdust-based Media with Barley Flours (보릿가루가 첨가된 침엽수 톱밥을 이용한 꽃송이버섯 재배)

  • Park, Hyun;Lee, Bong-Hun;Oh, Deuk-Sil;Ka, Kang-Hyeon;Bak, Won-Chull;Lee, Hak-Ju
    • Journal of Korea Foresty Energy
    • /
    • v.24 no.2
    • /
    • pp.31-36
    • /
    • 2005
  • Cauliflower mushroom (Sparassis crispa) is an edible mushroom that shows remarkably high contents of $1,3-{\beta}-D-glucan$ compared to other edible mushrooms. The mushroom is known to give high antitumor and immunologic activities, thus the mushroom is recently cultivated in Japan and Korea. However, cultivation methods are being kept in secret or under patents by some companies with complicated procedures. This study was conducted to solve the problem by providing a simple method for the cultivation of cauliflower mushroom. We could produce the mushroom using sawdust-based media of Larix leptolepis, Pinus densiflora and P. koraiensis with addition of barley flours and sugar. The ratio of the sawdust : barley flours : sugar used for this study was 80:20:3 in dry-weight base, and the water content was adjusted as 65%. The productivity was somewhat different among the species of sawdust media and the strains of Sparassis crispa for the cultivation, and the mushroom production reached up to 177g from 650g base(productivity : 27%). Thus, this medium is strongly recommended as a practical cultivation method for cauliflower mushroom. By the way, further study for the determination of adequate concentration of barley flour and the selection of proper strain for each sawdust species is needed.

  • PDF

A Study on the Possibility of Homegrown Terrorism in Korea Depending on Internalization and Strategy to Cope with the Terrorism (국제화에 따른 한국내 자생테러 발생 가능성과 대응전략)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.125-155
    • /
    • 2012
  • Terrorist organization has shown the trend of secret organization and it is harder to cope with terrorism because of uncertainty of terrorism. Homegrown terrorism is the one, whose preparation, execution and effect are restricted to domestic area. By the way, in the worldwide economic depression, violence and radical demonstration have shown the expansion trends as in Middle East, political revolution of Africa, anti-social resistance of Europe and Wall Street Occupation of USA. Homegrown terrorism is occurring in various countries such as UK and Spain as well as USA. Specialists warn homegrown terrorism in Korea. The purpose of this study was to prospect the possibility of homegrown terrorism that can be generated in the transfer to multi-culture society as various foreigners come to Korea rapidly and suggest the method to cope with the trend. The study analyzed environment and analysis of homegrown terrorism that Korea faces now. The methods to cope with homegrown terrorism are as follows. First, distribution of radical homegrown terrorism via internet should be prevented. Second, the connection between terrorist organization and homegrown terrorist should be prevented. Third, there should be a cooperation among government, residents and religious group. Fourth, there should be an open approach against multi-culture society. Fifth, there should be a systematic control for cause of new conflict. Finally, there should be a long-term approach to cause of new conflict. If we do not make an effort to prevent homegrown terrorism, terrorism environment may face new aspect and national and social cost for it will increase.

  • PDF

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

A Study on Yi Sang Representation in Media -Focusing on the cinema and the drama (영상매체에 형상화 된 시인 '이상' 표상 연구 -영화 <건축무한육면각체의 비밀>, 드라마 <이상 그 이상>을 중심으로)

  • Son, Mi-young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.29-36
    • /
    • 2019
  • Lee Sang's poems and his portraits are being used in various video media. Depending on the characteristics of the medium and genre, the representation of the poet or higher and his poems are selected and variations in different ways. In a modern era where literature communicates with various media, reviewing how a poet's portrait is shaped is also the process of reading what text wants to convey to the public through a single person. This study examined aspects in which representations of poets or higher were utilized in various image media, and compared and analyzed how poet aberrations are represented in each text. In particular, the discussion centered on the movie and the drama . In the movie , the above poem is used as a hidden puzzle. The film uses the popularly known 'genius' representation to track down Yi Sang's secret. Because of this, the film represents its ideal in a way that is faithful to the genre's custom of Thriller In comparison, the drama was about to re-emerge as a young man with a passion for the inner workings. The cynical attitude shown in the above text is also a reflection of the love for the nation and the times. These different typographical methods are worth noting in terms of the literary man's public perception of "Yi-sang" and the strategy of the new portrait attempt.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.