°£Æí°áÁ¦, ½Å¿ëÄ«µå û±¸ÇÒÀÎ
ÀÎÅÍÆÄÅ© ·Ôµ¥Ä«µå 5% (9,500¿ø)
(ÃÖ´ëÇÒÀÎ 10¸¸¿ø / Àü¿ù½ÇÀû 40¸¸¿ø)
ºÏÇǴϾð ·Ôµ¥Ä«µå 30% (7,000¿ø)
(ÃÖ´ëÇÒÀÎ 3¸¸¿ø / 3¸¸¿ø ÀÌ»ó °áÁ¦)
NH¼îÇÎ&ÀÎÅÍÆÄÅ©Ä«µå 20% (8,000¿ø)
(ÃÖ´ëÇÒÀÎ 4¸¸¿ø / 2¸¸¿ø ÀÌ»ó °áÁ¦)
Close

Cybercrime in the Republic of Korea 1 : Criminal Law and Policy on Cybercrime

¼Òµæ°øÁ¦

2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.

°øÀ¯Çϱâ
  • ÃâÆÇ»ç : KIC
  • ¹ßÇà : 2012³â 12¿ù 31ÀÏ
  • Âʼö : 175
  • ISBN : 9788973669066
Á¤°¡

10,000¿ø

  • 10,000¿ø

    500P (5%Àû¸³)

ÇÒÀÎÇýÅÃ
Àû¸³ÇýÅÃ
  • S-Point Àû¸³Àº ¸¶ÀÌÆäÀÌÁö¿¡¼­ Á÷Á¢ ±¸¸ÅÈ®Á¤ÇϽŠ°æ¿ì¸¸ Àû¸³ µË´Ï´Ù.
Ãß°¡ÇýÅÃ
¹è¼ÛÁ¤º¸
  • 4/27(Åä) À̳» ¹ß¼Û ¿¹Á¤  (¼­¿ï½Ã °­³²±¸ »ï¼º·Î 512)
  • ¹è¼Ûºñ : 2,500¿ø
ÁÖ¹®¼ö·®
°¨¼Ò Áõ°¡
  • À̺¥Æ®/±âȹÀü

  • ¿¬°üµµ¼­

  • »óÇ°±Ç

AD

Ã¥¼Ò°³

¡º»çÀ̹ö¹üÁ˹æÁö¸¦ À§ÇÑ ±¹Á¦Çù¾à¿¡ ÀÖ¾î Çѱ¹ÀÇ ¿ªÇÒ ¹× ±â¿©°¡´É¼º¿¡ ´ëÇÑ ¿¬±¸¡»´Â »çÀ̹ö¹üÁ˹æÁö¸¦ À§ÇÑ ±¹Á¦Çù¾à¿¡ À־ Çѱ¹Àº ¾î¶² ¿ªÇÒÀ» ÇؾßÇÏ°í ±â¿©°¡´É¼ºÀº ¾î¶°ÇÑÁö ¿¬±¸ÇÑ ³»¿ëÀ» ´ãÀº Ã¥ÀÌ´Ù.

¸ñÂ÷

Foreword i
Introduction iii
Part 1 1
I. Criminal Laws and Policies of Korea for Promoting International Cooperation in Cybercrime Control (Kim, Han-Kyun) 3
1. Challenges of Cybercrime and the Necessity of International Cooperation 4
2. Legal Challenges in the Matters of Cybercrime 5
3. Legal Aspects of International Cooperation in Cybercrime Control 6
4. Cybercrime and Criminal Laws in Korea 8
5. Korean Criminal Justice Policies for Cybercrime Control 13
6. European Council Convention on Cybercrime and Korea 15
7. Concluding Remarks 21

II. Recent Trend of Cybercrime in the Republic of Korea (Soung, Jea Hyun) 23
1. Introduction 23
2. Recent Trend of Korea's Cybercrime 24
(1) Trend of General Crime Using the Cyber Space 24
1) Infringement of Personal Information 24
2) Cyber Defamation 25
3) Cyber Stalking 26
4) Cyber Sexual Abuse 27
5) Cyber Fraud 29
(2) Trends of Cybercrime in SNS 29
1) Hacking and Spreading Malicious Code 30
2) Infringement of Privacy and Personal Information 30
(3) Form and Trend of Hacking and DDoS Attack 31
1) Concept and Trend of Hacking 31
2) DDoS Attack 33
(4) Smart Phone Related Area 35
1) Hacking 35
2) Infringement of Personal Information and Privacy Right 36
3) Illegal Payment with Smart Phones 37
(5) Game Area 37
1) Meaning of MMORPG 38
2) Item Trade 39
3) Item Theft 40

III. Institutions and Agencies for Cybercrime in the Republic of Korea (Choi, Joo-young) 41
1. Introduction 41
2. National Cyber Security Management System 41
(1) Cyberspace Defense Command within MND 43
(2) National Cyber Security Center 43
(3) Korea Internet and Security Agency 45
3. Central Administrative Agencies 47
(1) Korea Communications Commission 47
(2) National Computing and Information Agency 48
4. Research Organizations 48
(1) Electronics and Telecommunications Research Institute 48
(2) Korean Institute of Criminology 50
5. Security Monitoring and Control Centers 52
6. Investigative Agencies 54
(1) Korean National Police Agency 54
(2) Supreme Prosecutor¡¯s Office 55

IV. Overview of the Personal Information Protection Act (Chun, Hyun-wook) 57
1. Legislation of the Personal Information Protection Act 57
2. Main Content of the Personal Information Protection Act 59
(1) Expansion of the Subject and Scope of the Act 59
(2) Reinforcement of the Criteria for Processing of Personal Information 61
(3) Modification and Improvement of Related Systems 63
3. Confusion and Limitation from Practical Aspect 66
(1) Civil Society¡¯s Lack of Competence of Following Regulations 66
(2) The Degree of Criminal Injustice and Discordance of the Law System 68
(3) Issues of Precluding Illegality through Agreement of Personal Information Utilization 73
(4) Liability Issues of Compensation 74
4. Countermeasures 78

V. Recent Criminal Justice Programs on Cybercrime in the Republic of Korea (Lee, Angela Changjin) 81
1. Introduction 81
2. Efforts by the National Intelligence Service 83
(1) The National Intelligence Service and the National Cyber Security Center 83
(2) The National Cyber Threat Management Standards 85
(3) Implications 86
3. Efforts by the National Police Agency 87
(1) Overview 87
(2) Major Programs and Activities 88
(3) Implications 91
4. Efforts by the Korean Institute of Criminology and the United Nations Office on Drugs and Crime 92
(1) Background 92
(2) The Virtual Forum Against Cybercrime 96
(3) Towards AsiaJust 99
5. Concluding Remarks 101
?
Part 2 103
I. Recent Discussions on Hacking in the Republic of Korea (Lee, Won Sang) 105
1. Introduction 105
2. Trends and Types of Hacking 108
3. Areas of Hacking 110
4. Discussions on Punishment for Hacking in the Republic of Korea 114
(1) Direction of Discussions on Punishment for Hacking in the Republic of Korea 114
(2) Important Penal Provisions against Hacking in the Republic of Korea 116
5. Requests for Criminalization of Hacking at a Preliminary Stage 118
(1) Disrupting an Information and Communications Network 118
1) Concept of DDoS Attacks 118
2) Damages in the Republic of Korea 119
3) Possible Punishment for Attempted Hacking 121
(2) Intruding on an Information and Communications Network 123
1) Hacking into PCs or Servers 123
2) Hacking into Smart Phones 125
3) Scope of Attempted Hacking 126
6. Need for Criminalizing Preparations for Hacking 128
7. Conclusion 131 1

II. State and Preventive Measures of Evolving Voice Phishing Criminal Fraud (Yoon, Hae-Sung) 133
1. Introduction 133
2. Characteristic and Response Condition of Voice Phishing 134
(1) Derivation and Concept of Voice Phishing 134
(2) Characteristics of Voice Phishing Crime 135
(3) Status of Counteractions Taken against Voice Phishing 137
3. Investigation Trend of Recent Voice Phishing Crimes 141
(1) Voice Phishing Trend 141
(2) Types of Voice Phishing Cases 143
(3) Characteristics of Recent Voice Phishing Techniques 148
4. Prevention against Voice Phishing Damage 150
(1) Preventive Measures against Voice Phishing Damage 150
(2) Countermeasures against Voice Phishing Damage 152
5. Conclusion 155

III. Game-crime in the Republic of Korea (Sohn, Hee-jun Jenifer) 157
1. Introduction 157
2. General Trend and Statistics 158
3. Legislation 164
4. Recommendation 168
5. Conclusion 171

Bibliography 173

Àü°øµµ¼­/´ëÇб³Àç ºÐ¾ß¿¡¼­ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥

    ¸®ºä

    0.0 (ÃÑ 0°Ç)

    100ÀÚÆò

    ÀÛ¼º½Ã À¯ÀÇ»çÇ×

    ÆòÁ¡
    0/100ÀÚ
    µî·ÏÇϱâ

    100ÀÚÆò

    0.0
    (ÃÑ 0°Ç)

    ÆǸÅÀÚÁ¤º¸

    • ÀÎÅÍÆÄÅ©µµ¼­¿¡ µî·ÏµÈ ¿ÀǸ¶ÄÏ »óÇ°Àº ±× ³»¿ë°ú Ã¥ÀÓÀÌ ¸ðµÎ ÆǸÅÀÚ¿¡°Ô ÀÖÀ¸¸ç, ÀÎÅÍÆÄÅ©µµ¼­´Â ÇØ´ç »óÇ°°ú ³»¿ë¿¡ ´ëÇØ Ã¥ÀÓÁöÁö ¾Ê½À´Ï´Ù.

    »óÈ£

    (ÁÖ)±³º¸¹®°í

    ´ëÇ¥ÀÚ¸í

    ¾Èº´Çö

    »ç¾÷ÀÚµî·Ï¹øÈ£

    102-81-11670

    ¿¬¶ôó

    1544-1900

    ÀüÀÚ¿ìÆíÁÖ¼Ò

    callcenter@kyobobook.co.kr

    Åë½ÅÆǸž÷½Å°í¹øÈ£

    01-0653

    ¿µ¾÷¼ÒÀçÁö

    ¼­¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù)

    ±³È¯/ȯºÒ

    ¹ÝÇ°/±³È¯ ¹æ¹ý

    ¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼­ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼­ ½Åû °¡´É

    ¹ÝÇ°/±³È¯°¡´É ±â°£

    º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É
    ´Ü, »óÇ°ÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦Á¡ ¹ß°ß ÈÄ 30ÀÏ À̳»

    ¹ÝÇ°/±³È¯ ºñ¿ë

    º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã
    »óÇ°À̳ª ¼­ºñ½º ÀÚüÀÇ ÇÏÀÚ·Î ÀÎÇÑ ±³È¯/¹ÝÇ°Àº ¹Ý¼Û·á ÆǸÅÀÚ ºÎ´ã

    ¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯

    ·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì
    (´ÜÁö È®ÀÎÀ» À§ÇÑ Æ÷Àå ÈѼÕÀº Á¦¿Ü)

    ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
    ¿¹) È­ÀåÇ°, ½ÄÇ°, °¡ÀüÁ¦Ç°(¾Ç¼¼¼­¸® Æ÷ÇÔ) µî

    ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì
    ¿¹) À½¹Ý/DVD/ºñµð¿À, ¼ÒÇÁÆ®¿þ¾î, ¸¸È­Ã¥, ÀâÁö, ¿µ»ó È­º¸Áý

    ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì

    ·ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì

    »óÇ° Ç°Àý

    °ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½

    ¼ÒºñÀÚ ÇÇÇغ¸»ó
    ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó

    ·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© 󸮵Ê

    ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ

    (ÁÖ)KGÀ̴Ͻýº ±¸¸Å¾ÈÀü¼­ºñ½º¼­ºñ½º °¡ÀÔ»ç½Ç È®ÀÎ

    (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º´Â ȸ¿ø´ÔµéÀÇ ¾ÈÀü°Å·¡¸¦ À§ÇØ ±¸¸Å±Ý¾×, °áÁ¦¼ö´Ü¿¡ »ó°ü¾øÀÌ (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º¸¦ ÅëÇÑ ¸ðµç °Å·¡¿¡ ´ëÇÏ¿©
    (ÁÖ)KGÀ̴Ͻýº°¡ Á¦°øÇÏ´Â ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ Àû¿ëÇÏ°í ÀÖ½À´Ï´Ù.

    ¹è¼Û¾È³»

    • ±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.

    • Ãâ°í°¡´É ½Ã°£ÀÌ ¼­·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.

    • ±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.

    • ¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.

    • - µµ¼­ ±¸¸Å ½Ã 15,000¿ø ÀÌ»ó ¹«·á¹è¼Û, 15,000¿ø ¹Ì¸¸ 2,500¿ø - »óÇ°º° ¹è¼Ûºñ°¡ ÀÖ´Â °æ¿ì, »óÇ°º° ¹è¼Ûºñ Á¤Ã¥ Àû¿ë