• Title/Summary/Keyword: theft

Search Result 276, Processing Time 0.028 seconds

Children's Understanding of the Effect of Emotion on Moral Transgressions (도덕적 위반 행동의 결과에 대한 아동의 정서 이해)

  • Kim, Seong Min
    • Korean Journal of Child Studies
    • /
    • v.14 no.2
    • /
    • pp.95-114
    • /
    • 1993
  • The purpose of this study was to examine developmental trends in children's understanding of the effect of emotion on moral transgressions. The subjects were 120 children, 15 boys and 15 girls each at 4, 6, 8, and 10 years of age. The subjects listened to the moral transgression stories which were revised by this investigator based on Arsenio and Kramer's(1992) study. They reported their emotional attribution, justification, and emotional intensity about the story children engaged in moral transgression. The data of the present study were analyzed by ${\chi}^2$ and 2-way ANOVA for repeated measures. The results showed that (1) most of the children expected victimizers to feel happy. While happy responses decreased with age, fear responses increased with age. Most of the four-year-olds expected victims to feel sad, but 6-, 8-, and 10-year-olds expected anger. (2) Most children justified victimizers' emotions in terms of the outcome produced by victimization. This outcome-focused justification decreased with age, but morality-focused justification increased with age. In contrast, most children justified victims' emotion in terms of the victimization. This victimization-focused justification decreased with age, but morality-focused justification increased with age. (3) Most children viewed physical harm more negatively than theft on the part of victims.

  • PDF

Temple and Maternity Ward Security using FPRS

  • Ambeth Kumar, V.D.;Ramakrishnan, M.;Jagadeesh Kannan, R.
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.633-637
    • /
    • 2013
  • A wide range of applications for Foot Print Recognition System is discussed in this paper. The whole concept works under the principle that foot print is a parameter associated with biometrics that is very common as well as distinct. Its foremost application is at the government hospitals in the under developed and third world nations where there aren't the best of facilities. This system can be applied in the maternity ward of the hospitals for the identification or differentiation of the infants. Till date there has been no specialized system adopted for this purpose. The Foot Print Recognition System will overcome all the defects of any biometrics when applied here. Since the child will be very delicate for an iris scan and it will not be able to open its eyes wide or to correctly place its finger print on the sensor since the hands of a new born infant will be closed for a while. The Foot Print Recognition system can also be implemented in temples where there are cases of theft often reported. This can be used to grant access to the karpagraham of the deity by authorized users alone. These 2 applications of FPRS are discussed in this paper.

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

The Using Arduino for Data Communication Cryptographic Module (Arduino를 이용한 데이터 통신 암호 모듈)

  • Lee, Zhou-Sheng;Song, Jong-Gun;Lee, HoonJae;Kwon, DaeHoon;Pak, UiYoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.231-233
    • /
    • 2013
  • A lot of information is exchanged using data communications in today's modern society. Nowadays many important communications are susceptible to interception and theft for malicious purposes, and is under threat from hackers. Crackers are able to hack into data flows even if the data is encrypted. To ensure strong encryption properties, these cryptographic algorithms are often a burden on devices used for authentication such as a PC or smart phone. This paper proposes an authentication system using the Arduino module. Implementation and application of the communication scheme is designed to minimize the burden of delivering data communication between devices especially where password and encryption is concerned.

  • PDF

A Design of Platform of Portable Cultural Assets Surveillance System (이동형 문화재 감시시스템의 플랫폼 설계)

  • Jung, Moo Kyung;Choi, Chang Yong;Lee, Ho Cheol;Lee, Dong Myung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.599-600
    • /
    • 2013
  • In this paper, a platform of portable cultural assets surveillance system is designed in order to prevent the theft of cultural assets. The platform was designed to take into account the characteristics of the cultural assets for minimizing of the damage of cultural assets. The platform is composed of the portable cultural assets surveillance system and the collaboration network protocol among th surveillance system. If an intruder steals the cultural assets and moves according to the scheduled route, it is expected that the platform has a great role because the platform of portable cultural assets surveillance system can performs the continuous tracking by the collaboration network.

  • PDF

Development of an IoT-based Unmanned Home-Delivery Box System (사물인터넷(IoT) 기반의 무인 택배함 시스템 개발)

  • Park, Chan Hee;Kang, Hyun Tae;Kang, Chang Soon
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.129-138
    • /
    • 2017
  • This paper is concerned with an Internet of Things (IoT)-based unmanned home-delivery box system, in which the system is developed with a prototype using a weight sensor, shock sensor, the Arduino and Raspberry-Pi of open-source hardware platforms. The developed system provides several functions such as a safe storage means, prevention of delivery-theft, and remote control of the home-delivery box, etc. Specifically, the system recognizes the arrival of goods by detecting the weight of deliveries and sends the arrived message of deliveries to the recipient' smartphone, and also controls (i.e., open and close) the locker of the unmanned home-delivery box system remotely with the smartphone. Furthermore, the developed system provides automatically a warning alarm around the unmanned home-delivery box when an external shock is applied to the home-delivery box, and sends a message on the shock to the recipient' smartphone. The major functions of the developed home-delivery box system have been verified in a realistic environment, and confirmed to work well. With the application of the developed home-delivery box system to the homes and offices where recipients are always not to stay, it is expected to significantly improve the safety of delivered goods as well as to effectively prevent the delivery operatives posing as a crime.

Design of Remote Control System for Data Protection and Backup in Mobile Devices (이동통신 단말기에서 데이터 보호 및 백업을 위한 원격 제어 시스템 설계)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.37-42
    • /
    • 2011
  • The change in performance of the mobile communication field took place due to jumping development of technology, so high performance terminals that anyone can directly search and amend desired information anywhere and anytime, namely, the mobile communication terminals called Smartphone were released to the market. The terminal can store informations that an individual stored, for example, call log, where to make contact and address of acquaintances, transmit/receive message and mail, photographs and videos, etc., but there are worries on surreptitious use of other people due to leaking of personal information through loss or theft of these terminals because of several reasons, so the present thesis aims to realize a method that remotely control information inside a terminal in case of loss of a mobile communication terminal.

A Study on the Vehicle Black Box with Accident Prevention (사고예방이 가능한 차량용 블랙박스 시스템에 관한 연구)

  • Kim, Kang Hyo;Moon, Hae Min;Shin, Ju Hyun;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.4 no.1
    • /
    • pp.39-43
    • /
    • 2015
  • A vehicle black box helps to investigate the cause of accident by recording time, and videos as wells as shock information of the time of accident Lately, intelligent black box with accident prevention as well as existing functions is being studied. This paper proposes an applicable algorithm for vehicle black boxes that prevent any accident likely to occur while a car is parked, like robbery, theft or hit-and-run. Proposed algorithm provides object recognition, face detection and alarm as the object approaches car. Tests on the algorithm prove that it can recognize an approaching object, identify and set alarm if needed, depending on each risk level.

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

Counterproductive Work Behaviors and Narcissism (반생산적인 업무행동에 대한 자기애적 성격특성의 이해)

  • Joo Weon-Sig;Cha Ta-Soon
    • Management & Information Systems Review
    • /
    • v.10
    • /
    • pp.33-66
    • /
    • 2002
  • Counterproductive work behaviors are behaviors by employees intended to harm their organization or organization members. Human is the being has a desire and behaviors. To understand behaviors of an individual, it is important to understand the personality which determines a difference between individuals. Narcissists has psychological traits to be likely to experience negative emotions, such as frustration, hostility or anger, and this psychological traits of narcissists are more likely to induce an aggression. In this view, the purpose of this study was to examine the relationships between counterproductive work behaviors and narcissistic personality characteristics and to explore psychological dynamics about how narcissistic personality characteristics had an effect on counterproductive work behaviors. As a result, facts known were as follows. First, narcissists has strong desires to maintain a sense of superiority over others and defend their egos against unpleasant evaluation information, even if the information is factual and accurate. Second, narcissists are hyper-sensitive to negative information and are more likely to encounter information or situations that challenge their positive self-appraisals by this view. Third, in response to these challenges, or ego threats, these individuals are more likely to experience negative emotions, such as anger, frustration, or hostility. Forth, this negative emotions lead to aggression and as a result, this is more likely to induce counterproductive work behaviors such as theft, sabotage, interpersonal aggression, work slowdowns, wasting time and materials, and spreading rumors. Thus, narcissism is another individual difference variable that may be an important factor in determining counterproductive work behaviors, particularly under conditions perceived to be difficult or stressful.

  • PDF