• Title/Summary/Keyword: theft

Search Result 275, Processing Time 0.028 seconds

The relation between the five critical crime of criminal law and the private security services (형법범죄 중 5대 범죄와 민간경비 간의 관계)

  • Joo, Il-Yeob;Jo, Gwang-Rae
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.361-377
    • /
    • 2004
  • This study is to examine the relations between the big five critical crime that consist of homicide, robbery, rape, theft, violence and the private security services. To achieve this objective, this research selected the subject of study, specially, 2002 status of the private security such as the number of companies and employees classified by areas along with the big five crime mentioned above classified by area. The research data is secondary data that is from '2003 Crime Analysis' of the Supreme Public Prosecutors' Office and 'The private Security Related Data' of the National Police Agency. The selected data were analyzed according to the variables by using SPSS 10.0 statistics software program. Each hypothesis was verified around the level of significance ${\alpha}$=.05 by using the statistical techniques, such as Descriptive Statistics, Correlation, Regression, etc. The following was the result of the study, First, the total number of the big five crime affects the number of the companies at significant level. Second, the number of the security companies can be explained by the each total number of the big five crime in the order of theft, robbery, violence, rape and murder. Third, the total number of the big five crime affects the number of the security employees at significant level. Forth the number of the security employees can be explained by the each total number of the big five crime in the order of theft, robbery, violence, rape and murder.

  • PDF

Android App Birthmarking Technique Resilient to Code Obfuscation (난독화에 강인한 안드로이드 앱 버스마킹 기법)

  • Kim, Dongjin;Cho, Seong-Je;Chung, Youngki;Woo, Jinwoon;Ko, Jeonguk;Yang, Soo-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.700-708
    • /
    • 2015
  • A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.

A Study On Design and Implementation of Mobile Bicycle Anti-theft System using Wireless Network (무선 네트워크를 이용한 모바일 자전거 도난방지 시스템의 설계 및 구현에 관한 연구)

  • Baek, Jeong-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.345-347
    • /
    • 2013
  • 최근 환경문제의 심각성이 고조됨에 따라 Co2 배출량 감소계획에 따른 세계 각국의 정부주도로 민간 및 지방자치단체에서도 그린에너지, 저탄소 녹색성장 프로젝트, 승용차요일제 등 다양한 정책을 시행하고 있다. 따라서 탄소저감의 효율적인 방안으로서 승용차 운행을 줄이고 자전거 활용의 활성화에 대한 관심이 증대되고 있다. 본 논문에서는 자전거활용의 활성화를 위하여 자전거 도난방지와 관리를 위한 저비용의 무선 네트워크를 활용한 임베디드 제어 모듈과 모바일 서비스 기반의 자전거 관리시스템을 설계하고 구현 기법을 제안하였다.

  • PDF

A Study on Pickpocket of Theft (절도죄에서 소매치기에 관한 연구)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Lee, Jong-Chan;Park, Sang-Joon;Rhee, Yang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.41-43
    • /
    • 2012
  • Pickpockets occurs most crowded in a crowded place. However, the current occurs more commonly in a secluded place and unfrequented place. In this paper, we classified to the scene for submitting to image forensics evidence target for pickpockets of theft. We wish to submit evidence by classifying as a pickpocket scene video.

  • PDF

A Study on Pickpocket of Theft in Image Forensic (영상 포렌식에서 절도죄 중 소매치기에 관한 연구)

  • Jang, Dai-Hyun;Rhee, Yang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.223-224
    • /
    • 2012
  • 본 논문에서는 영상 포렌식에 관한 내용을 절도죄 중 소매치기를 대상으로 연구를 수행하였다. 절도죄에서 소매치기는 대부분 사람이 많은 곳에서 사람이 서있는 경우와 앉아있는 경우에 발생한다. 또한 술에 만취해서 누워있는 경우에도 발생한다. 본 눈문에서는 이러한 소매치기의 특징을 파악하여 CCTV로 촬영한 영상에서 범죄를 가려내어 증거 자료로 제출 하고자 한다.

  • PDF

A Survey of RFID Deployment and Security Issues

  • Grover, Amit;Berghel, Hal
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.561-580
    • /
    • 2011
  • This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.

Towards Theft Protection Using Trajectory Based Anomaly Detection (이동경로에 기반한 이상감지를 통한 도난 방지 연구)

  • Saleem, Muhammad Aamir;Saleem, Muhammad Usman;Khan, Kifayat Ullah;Lee, S.Y.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.445-446
    • /
    • 2012
  • The growth in number and capacity of smart devices such as GPS enabled smart phones and PDAs present an unparalleled opportunity for diverse areas of life. In this paper we propose an approach for vehicle theft protection using GPS based trajectory anomaly detection. The detailed methodology of the proposed system is briefly described in this paper.

PRELIMINARY PROJECT OF WATER SUPPLY FOR NDATA FARM, MALAWA

  • Min-Shun Lee;Hung-Kwai Chen;Sheng Liang;Ho-Shong Hou
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1615-1617
    • /
    • 2009
  • The water resources project of 320 Ha second stage reclamation, in which including an University City, out of 800 Ha Ndata Farm, Malawa, had been under studied in this research. The challenge of C value of runoff coefficient was obtained as 0.8, by introducing the attenuation factors method, proposed by second author, an IDF dimensionless method customary used in Taiwan, proposed by the third author, is translated further to solve the project design rainfall; Rational Method, thus, obtains 11.5 CMS as the 5 year recurrence storage. The final job, completed by the third author's on-site performance, includs field alignments and discussions with the trustee, Malawa President H. E. Dr. Bingu Wa Mutharika, when a special concern of anti-theft. In order to provide sufficient supply up to an amount of 44,000 M3 during April to November, the sketch package includes 6 measurements: one water barrage, one sluice gate, one intake, one sediment reservoir, one water reservoir, and 3199 Km long gravity-driving hydraulic pipe.

  • PDF

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.