• Title/Summary/Keyword: theft

Search Result 275, Processing Time 0.025 seconds

A Study on the Improvement of Disaster and Safety Management for Local Cultural Heritages (지방문화재 재난안전관리 개선방안에 관한 연구)

  • Kim, Twe-Hwan;Kim, Jung-Gon;Been, Ju-Hee
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.358-366
    • /
    • 2019
  • Purpose: This paper aims to clarify the problems and to examine the improvement methods by investigating the management condition of local-designated cultural property of which management is relatively poor in comparison with state-designated cultural heritage. Method: In order to grasp the management situation of the local-designated cultural heritage, a research on cultural heritage management situation and problems will be carried out with 35 cultual heritages in Goryeong-gun. Also, the improvement methods about the property type vulnerability on the basis of interview with cultual property managers, fire-fighting officers and civil servants, etc. Results: Local cultural heritages were investigated to be very vulnerable to the fire of wooden buildings, the theft of movable cultural heritages, and the effects of wind and water damage. It is because cultural heritages are scattered over wide areas fundamentally. As the result, it has difficulty in the patrols of police officers and fire fighters, and in the situation that it lacks disaster monitoring and CCTV for countermeasures to replace them, electronic security including fire hydrant, sensors, etc and fire extinguishing facilities and so on. It is difficult for local governments managing local-designated cultural heritages to enhance their management systems directly due to their lack of budget and manpower. Conclusion: In order to strengthen disaster and safety management system for the cultural heritages designated by local governments, they have to clarify disaster countermeasure task of fire fighting, police, and cultural heritage managers prepare their manuals, and systematize them through disaster drill mainly in local autonomous governments. Also, so as to establish a surveillance system every day, they have to enhance the community for local cultural heritage manage consisting of local volunteer fire departments, local voluntary disaster prevention organizations, volunteers, etc.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Spatio-temporal analysis with risk factors for five major violent crimes (위험요인이 포함된 시공간 모형을 이용한 5대 강력범죄 분석)

  • Jeon, Young Eun;Kang, Suk-Bok;Seo, Jung-In
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.5
    • /
    • pp.619-629
    • /
    • 2022
  • The five major violent crimes including murder, robbery, rape·forced indecent act, theft, and violence are representative crimes that threaten the safety of members of society and occur frequently in real life. These crimes have negative effects such as lowering the quality of citizens' life. In the case of Seoul, the capital of Korea, the risk for the five major violent crimes is increasing because the population density of Seoul is increasing as a large number of people in the provinces move to Seoul. In this study, to reduce this risk, the relative risk for the occurrence of the five major violent crimes in Seoul is modeled using three spatio-temporal models. In addition, various risk factors are included to identify factors that significantly affect the relative risk of the five major violent crimes. The best model is selected in terms of the deviance information criterion, and the analysis results including various visualizations for the best model are provided. This study will help to establish efficient strategies to sustain people's safe everyday living by analyzing important risk factors affecting the risk of the five major violent crimes and the relative risk of each region.

A Study on the narrative characteristic of (<불타는 그라운드> 서사 특성 연구)

  • Ko, Hoon
    • Journal of Popular Narrative
    • /
    • v.27 no.3
    • /
    • pp.127-150
    • /
    • 2021
  • This study focuses on analyzing the epic characteristics of a korean sports cartoon called "Burning Ground" in the 1970s. Through this, we would like to reveal that only "Burning Ground" has a unique narrative. We hope that such research will accumulate and serve as the basis for the study of Korean sports cartoon. In the 1970s and 1980s, Korean sports cartoons were narratives of the main characters. The story of the family is central to the narrative. Family revenge is mainly the central narrative. Plural narratives are serious, and sports act as auxiliary narratives. It uses 'Spocon', a characteristic of Japanese sports cartoons, to show its efforts to get revenge. Therefore, it is extremely rare to use professional knowledge in Korean sports cartoons in the 1970s. Burning Ground uses an escalating system to construct incremental narratives. The three-dimensional narrative is composed by utilizing various narratives of surrounding characters. The use of expertise in football is a feature of the 1990s, and showing this in the 1970s means that the work is ahead of its time. There are limitations of Japanese cartoon theft and plagiarism. However, through this, it provides evidence to examine the relationship between Korea and Japan. And timeless epic speciality must be recognized. The study is meaningful in that it can broaden the perspective of Korean cartoon research in the 1970s.

Improving Policy of Bunker Quality Management System in Korean Ports (우리나라 항만의 벙커 품질관리시스템 개선방안)

  • Kim, Hyung-Tae
    • Journal of Korea Port Economic Association
    • /
    • v.38 no.2
    • /
    • pp.11-30
    • /
    • 2022
  • Korean ports have some problems in the aspect of quality & quantity in the bunkering process. Quality of bunker is assessed as more higher than competing ports. However, quality of bunkering procedure is assessed as lower. Especially, supply chain from loading of bunker to the bunker barge at oil terminal, transport it, and supply it to the ship has not been secured. Furthermore, aspect of quantity of bunker is more serious rather than that of quality of bunkering process. Disputes on the quantity of bunker between seller and buyer occur frequently, and residue & theft of bunker is also popularized issue and serious problem. Low bunkering fee is recognized as major reason of that problem, however, though low fee can be solved, it can not be necessary secured that problem could be solved, Therefore, this paper investigates and suggests the scheme to solve the quality problems of bunker supplying procedure, and develop solution toward advanced bunkering ports through removal of the quantity disputes. Concretely, this paper suggests introduction of quality system of bunker supply chain in the aspect of bunker supply procedure, and diversion from conventional sounding method to innovative Mass Flow Metering System in the aspect of bunker measuring. These two innovative solutions contribute to the removal and improvement of current structural problems in bunkering procedure.

Factors influencing success and safety of AED retrieval in out of hospital cardiac arrests in Singapore

  • NG, Jonathan Shen You;HO, Reuben Jia Shun;YU, Jae Yong;NG, Yih Yng
    • The Korean Journal of Emergency Medical Services
    • /
    • v.26 no.2
    • /
    • pp.97-111
    • /
    • 2022
  • Purpose: Automated External Defibrillator (AED) usage in out-of-hospital cardiac arrests (OHCAs) improves the survival of patients. In Singapore, public AEDs are protected by locked boxes with a 'break glass' mechanism to deter theft. Community responders have sustained injuries while breaking glass to retrieve AEDs. This unprecedented study aimed to elucidate the factors influencing successful retrieval of an AED and to document the prevalence of injuries. Methods: A survey was created and distributed. Participants were required to have responded to an OHCA in the past 12 months. Comparison tests were performed with the Fischer-Freeman-Halton Exact test or Pearson chi square test at 5% significance levels, and with multiple logistic regression with a logit link function. Results: Eighty-eight participants were eligible. The success of retrieving an AED was found not to be impacted by occupation, age, gender or time. Participants who responded to an OHCA because of activation by the myResponder App were more likely to retrieve an AED successfully. (AOR 11.111, 95% CI: 2.141-58.824) Conclusion: Use of the myResponder mobile application is associated with the greater success of retrieving an AED. Successful retrieval of an AED is not impacted by time, gender, age, or the occupation of the responder. Community responders in Singapore remain motivated to respond to Cardiac Arrests despite risk of injury.

A Study on the Korean Patent Registration Trend of Outdoor Exercise Equipment for the Elderly (노인 관련 야외운동기구의 국내 특허 등록 동향에 관한 연구)

  • Dong-Cheol Chi;Hong-Young Jang
    • Journal of Industrial Convergence
    • /
    • v.21 no.6
    • /
    • pp.43-51
    • /
    • 2023
  • This study analyzed the patent status of the outdoor exercise equipment used primarily by the elderly. The purpose is to utilize the basic data obtained to promote the health of the elderly. The information on the patent was collected from KIPRIS, an information search service provided by the Korean Intellectual Property Office. The search term used was 'outdoor exercise equipment', directly related patents were selected, and a final 157 were analyzed. As a result of the analysis, first, patent registration began in 2007, and 2-3 patents were registered on average every year. Second, patents from the perspective of sports convergence that provide an exercise prescription system using wireless communication, such as the ability to generate electricity by operating a power generation module, providing information on the user's exercise amount, or preventing the loss and theft of weights and safety accidents due to their characteristics, were searched for. Lastly, patents related to exercise equipment that can provide user convenience and increase the frequency of use of exercise equipment were searched. The results of this study confirmed that outdoor exercise equipment is being developed more for the elderly and their convenience, and that companies and public institutions are showing increased interest in outdoor exercise equipment for the elderly. In addition to patent trends analysis, follow-up research in connection with exercise programs using outdoor exercise equipment is needed to develop practical and convenient outdoor exercise equipment in the future.

Self-Disclosure and Cyberbullying on SNS (SNS상에서 자기노출과 사이버불링)

  • Jooyeon Won;DongBack Seo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.1-23
    • /
    • 2017
  • Since the development of information communication technologies, social networking sites (SNSs) have been diffused to the world with benefits such as building and maintaining relationships among people. SNSs have become more popular with the development of mobile devices. Despite this advantage, SNSs also present unexpected effects on people, such as cyberbullying and identity theft. Cyberbullying has emerged as one of the most serious issues among people who use SNSs. In fact, almost 20% of teenagers confessed that they have been cyberbullied on SNSs. In consideration of this serious social issue, this study investigates the influences of self-disclosure and self-control on the cyberbullying victimization experience from the perspective of Social Exchange Theory. Self-disclosure is a basic characteristic of SNSs. It is classified into self-disclosure for access to SNS and self-disclosure for relationship building and maintaining on SNSs. The cyberbullying victimization experience is classified into being cyber-excluded and being cyber-attacked. We examine how two types of self-disclosure and self-control affect two types of cyberbullying victimization experience based on the survey data of people who are in their 20s and are greatly familiar with SNSs.

A Study on the Certification System for Offline Stores Selling Copyrighted Contents: Copyright OK Case (정품 콘텐츠 판매 오프라인 업체 인증제도 방안 연구: 저작권 OK 사례)

  • Gyoo Gun Lim;Jae Young Choi;Woong Hee Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.27-42
    • /
    • 2017
  • With the rapid development in network, graphic technology, and digital technology, content industry is emerging as an important industry for new cultural development and economic development. The development in digital content technology has remarkably expanded the generation and distribution of contents, thereby creating new value and extending into a large distribution market. However, the ease of distribution and duplication, which characterizes digital technology, has increased the circulation of illegal contents due to illegal copying, theft, and alteration. The damage caused by this illegal content is severe. Currently, a copyright protection system targeting online sites is available. By contrast, no system has been established for offline companies that sell offline genuine content, which compete with online companies. The demand for content of overseas tourists is increasing due to the Korean wave craze. Nevertheless, many offline content providers have lost competitiveness due to illegal content distribution with online companies. In this study, we analyzed the case and status of similar copyright certification systems in Korea and overseas through previous research and studied a system to certify the offline genuine contents business. In addition to the case analysis, we focused on interviews obtained through in-depth interviews with the copyright stakeholders. We also developed a certification framework by establishing the certification domain, certification direction, and incentive of the certification system for offline businesses with genuine content. Selected certification direction is ethical, open, inward, store, and rigid (post evaluation). This study aimed to increase awareness among consumers about the use of genuine content and establish a transparent trading order in a healthy content market.

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.