15 research outputs found

    Methods for Examination of Evidence that conforms to the nature of Digital Evidence

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์œตํ•ฉ๊ณผํ•™๊ธฐ์ˆ ๋Œ€ํ•™์› ์ˆ˜๋ฆฌ์ •๋ณด๊ณผํ•™๊ณผ, 2021. 2. ์ด๋ณ‘์˜.The aim of criminal proceedings is to determine specific legal relations, that is, whether or not a crime is established, and to determine the appropriate type and amount of punishment if a crime is established. These legal relations presuppose a certain factual relationship, and the data used to confirm the factual relationship is evidence. Evidence encompasses three meanings. That is, โ‘  the method of proof referring to the objects or people themselves(eg: witness, evidentiary documents, article of evidence) that become the data of fact recognition, โ‘ก the evidential data indicating what they learned by investigating the method of proof(eg: the witnessโ€™ testimony, the nature of article of evidence), and โ‘ข the evidence results that include the evidential data and the other non-verbal data obtained through examination of evidence(eg: the expression or attitude of a witness during the examination of a witness). Digital evidence can be defined as "information that can be trusted in court as stored or transmitted in binary form." This concept focuses on 'the evidential dataโ€™ among the above three meanings of evidence. In the investigation and judicial practice about digital evidence in Korea, identity, integrity, and reliability should be met as requirements for the admissibility of evidence, and in the case of duplicating, serching or printing digital data storage media or hard copy or imaging, etc, by moving to the office of an investigative agency, the Supreme court says that in principle, the confiscated person or lawyer should be given an opportunity to participate in such a series of processes. In practice, when collecting digital evidence, a hash value is calculated and a confirmation written in it is issued to the participants to deal with issues such as identity. However, as shown by the controversy about the CCTV video storage device of the Ferry Sewol, when the confiscated person cannot participate when collecting digital evidence for the first time, distrust may arise over the time and subsequent analysis process of the first collection of digital evidence. Therefore, this paper first examines the hierarchical structure of digital evidence, and then proposes the following three ways to improve the Methods for Examination of Evidence that best suits the nature and characteristics of digital evidence. The first is not to provide evidence of documents printed from digital storage media that is confiscated article(= corresponds to โ€˜the method of proofโ€™ that requires verification of identity, integrity, reliability, etc), but to collect and submit โ€˜0 or 1โ€™ digital form of information itself(= correspons to โ€˜the evidential dataโ€™) to the court. In this case, the file itself which is information in digital form(primary evidence) and a screen or document reproduced in a program, such as a document viewer(secondary evidence) are submitted together, which can be compared to document written in a foreign language or a technical code(primary evidence) and a translation or a result of appraisal(secondary evidence). The second is the improvement of the technical sealing measure to secure the authenticity of digital evidence submitted as primary evidence as above. Currently, the hash value of the file itself, which is the evidence, is calculated and a confirmation letter is issued to the participants. In addition to the file as evidence, letโ€™s include โ€˜the time of collecting digital file that can be objectively verified' to parameters of the hash function. If the time of collecting is acquired by an authorized method and included to the parameters of the hash function, the time of collecting the digital evidence can be objectively guaranteed even if there is no participant at the collection site. As the technical means, NTP or TSA can be considered. The third is a virtual machine. In order to gain confidence in the above series of evidence collection and analysis processes, a system that performs all procedures such as file collection, analysis, and time check is implemented as a virtual machine, and all actions performed in the virtual machine are recorded. After that, the hash value for the virtual machine itself and the hash value for the behavior record are calculated and preserved. As a result, it is possible to secure trust in the subject of the forensic investigation and the investigation process. As above, the improvement measures for the deficiencies in the current practice regarding the collection and investigation of digital evidence were reviewed at the theoretical level. When the electronic system of criminal procedure is completed soon, the investigation of digital evidence in the way proposed will be smoothly conducted in the courtroom.ํ˜•์‚ฌ์†Œ์†ก์˜ ๋ชฉํ‘œ๋Š” ๊ตฌ์ฒด์  ๋ฒ•๋ฅ ๊ด€๊ณ„ ์ฆ‰, ๋ฒ”์ฃ„์˜ ์„ฑ๋ฆฝ ์—ฌ๋ถ€๋ฅผ ํ™•์ •ํ•˜๊ณ , ๋ฒ”์ฃ„๊ฐ€ ์„ฑ๋ฆฝํ•˜๋Š” ๊ฒฝ์šฐ ์ ์ •ํ•œ ํ˜•๋ฒŒ์˜ ์ข…๋ฅ˜์™€ ์–‘์„ ์ •ํ•จ์— ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฒ•๋ฅ ๊ด€๊ณ„๋Š” ์ผ์ •ํ•œ ์‚ฌ์‹ค๊ด€๊ณ„๋ฅผ ์ „์ œ๋กœ ํ•˜๊ณ , ๊ทธ ์‚ฌ์‹ค๊ด€๊ณ„๋ฅผ ํ™•์ •ํ•˜๋Š”๋ฐ ์‚ฌ์šฉ๋˜๋Š” ์ž๋ฃŒ๊ฐ€ ์ฆ๊ฑฐ์ด๋‹ค. ์ฆ๊ฑฐ๋Š” ์•„๋ž˜ 3๊ฐ€์ง€ ์˜๋ฏธ๋ฅผ ํฌ๊ด„ํ•œ๋‹ค. ์ฆ‰ โ‘  ์‚ฌ์‹ค ์ธ์ •์˜ ์ž๋ฃŒ๊ฐ€ ๋˜๋Š” ๋ฌผ๊ฑด์ด๋‚˜ ์‚ฌ๋žŒ ์ž์ฒด(์˜ˆ: ์ฆ์ธ, ์ฆ๊ฑฐ์„œ๋ฅ˜, ์ฆ๊ฑฐ๋ฌผ)๋ฅผ ๊ฐ€๋ฆฌํ‚ค๋Š” ์ฆ๊ฑฐ๋ฐฉ๋ฒ•, โ‘ก ์ฆ๊ฑฐ๋ฐฉ๋ฒ•์„ ์กฐ์‚ฌํ•จ์œผ๋กœ์จ ์•Œ๊ฒŒ ๋œ ๋‚ด์šฉ(์˜ˆ: ์ฆ์ธ์˜ ์ฆ์–ธ๋‚ด์šฉ, ์ฆ๊ฑฐ๋ฌผ์˜ ์„ฑ์งˆ)์„ ๊ฐ€๋ฆฌํ‚ค๋Š” ์ฆ๊ฑฐ์ž๋ฃŒ, ๊ทธ๋ฆฌ๊ณ  โ‘ข ์ฆ๊ฑฐ์ž๋ฃŒ์™€ ๊ทธ ๋ฐ–์— ์ฆ๊ฑฐ์กฐ์‚ฌ๋ฅผ ํ†ตํ•ด ์–ป๋Š” ๋น„์–ธ์–ด์ ์ธ ์ž๋ฃŒ(์˜ˆ: ์ฆ์ธ์‹ ๋ฌธ์‹œ์˜ ํ‘œ์ •์ด๋‚˜ ํƒœ๋„ ๋“ฑ)๋ฅผ ํฌ๊ด„ํ•˜์—ฌ ๋œปํ•˜๋Š” ์ฆ๊ฑฐ๊ฒฐ๊ณผ๊ฐ€ ๊ทธ๊ฒƒ์ด๋‹ค. ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋Š” โ€˜2์ง„์ˆ˜ ํ˜•ํƒœ๋กœ ์ €์žฅ ํ˜น์€ ์ „์†ก๋˜๋Š” ๊ฒƒ์œผ๋กœ์„œ ๋ฒ•์ •์—์„œ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ •๋ณดโ€™๋ผ ์ •์˜ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Š” ์ฆ๊ฑฐ์˜ ์œ„ 3๊ฐ€์ง€ ์˜๋ฏธ ์ค‘ โ€˜์ฆ๊ฑฐ์ž๋ฃŒโ€™์— ์ฃผ์•ˆ์ ์„ ๋‘” ๊ฐœ๋…์ด๋‹ค. ์šฐ๋ฆฌ๋‚˜๋ผ์—์„œ ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์— ๊ด€ํ•œ ์ˆ˜์‚ฌ ๋ฐ ์žฌํŒ์‹ค๋ฌด์ƒ ๊ทธ ์ฆ๊ฑฐ๋Šฅ๋ ฅ ์ธ์ • ์š”๊ฑด์œผ๋กœ์„œ ๋™์ผ์„ฑ, ๋ฌด๊ฒฐ์„ฑ, ์‹ ๋ขฐ์„ฑ ๋“ฑ์„ ์ถฉ์กฑํ•˜์—ฌ์•ผ ํ•˜๊ณ , ์ „์ž์ •๋ณด๊ฐ€ ๋‹ด๊ธด ์ €์žฅ๋งค์ฒด ๋˜๋Š” ํ•˜๋“œ์นดํ”ผ๋‚˜ ์ด๋ฏธ์ง• ๋“ฑ ํ˜•ํƒœ๋ฅผ ์ˆ˜์‚ฌ๊ธฐ๊ด€ ์‚ฌ๋ฌด์‹ค ๋“ฑ์œผ๋กœ ์˜ฎ๊ฒจ ๋ณต์ œยทํƒ์ƒ‰ยท์ถœ๋ ฅํ•˜๋Š” ๊ฒฝ์šฐ ํŒ๋ก€๋Š” ๊ทธ์™€ ๊ฐ™์€ ์ผ๋ จ์˜ ๊ณผ์ •์—์„œ ์›์น™์ ์œผ๋กœ ํ”ผ์••์ˆ˜์ž๋‚˜ ๋ณ€ํ˜ธ์ธ์—๊ฒŒ ์ฐธ์—ฌ์˜ ๊ธฐํšŒ๋ฅผ ๋ณด์žฅํ•˜์—ฌ์•ผ ํ•œ๋‹ค๊ณ  ๋ณด๊ณ  ์žˆ๋‹ค. ์‹ค๋ฌด์ƒ ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋ฅผ ์ˆ˜์ง‘ํ•  ๋•Œ์— ํ•ด์‹œ๊ฐ’์„ ์‚ฐ์ถœํ•˜์—ฌ ์ด๋ฅผ ๊ธฐ์žฌํ•œ ํ™•์ธ์„œ๋ฅผ ์ฐธ์—ฌ์ž์—๊ฒŒ ๊ต๋ถ€ํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ๋™์ผ์„ฑ ๋“ฑ์˜ ๋ฌธ์ œ์— ๋Œ€์ฒ˜ํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฐ๋ฐ ์˜ˆ์ปจ๋Œ€ ์„ธ์›”ํ˜ธ ์„ ์ฒด์˜ CCTV ๋™์˜์ƒ ์ €์žฅ์žฅ์น˜๋ฅผ ๋‘˜๋Ÿฌ์‹ผ ๋…ผ๋ž€์—์„œ ๋ณด๋“ฏ์ด ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋ฅผ ์ตœ์ดˆ ์ˆ˜์ง‘ํ•  ๋•Œ ํ”ผ์••์ˆ˜์ž ๋“ฑ์ด ์ฐธ์—ฌํ•  ์ˆ˜ ์—†๊ฑฐ๋‚˜, ์กฐ์‚ฌ ์ฃผ์ฒด์— ๋Œ€ํ•œ ์‹ ๋ขฐ๊ฐ€ ์—†๋Š” ์ƒํ™ฉ์—์„œ๋Š” ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋ฅผ ์ตœ์ดˆ๋กœ ์ˆ˜์ง‘ํ•œ ์‹œ๊ฐ ๋ฐ ๊ทธ ์ดํ›„์˜ ๋ถ„์„ ๊ณผ์ •์— ๋Œ€ํ•˜์—ฌ๋„ ๋ถˆ์‹ ์ด ์ƒ๊ธธ ์ˆ˜ ์žˆ๋‹ค. ์ด์— ์ด ๋…ผ๋ฌธ์€ ์šฐ์„  ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์— ๊ด€ํ•œ ๊ณ„์ธต์  ๊ตฌ์กฐ๋ฅผ ์‚ดํŽด๋ณด๊ณ , ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ๋ณธ์งˆ๊ณผ ํŠน์„ฑ์— ๊ฐ€์žฅ ์–ด์šธ๋ฆฌ๋Š” ์ฆ๊ฑฐ์กฐ์‚ฌ ๋ฐฉ๋ฒ•์œผ๋กœ ์•„๋ž˜ 3๊ฐ€์ง€ ๊ฐœ์„  ๋ฐฉ์•ˆ์„ ์ œ์•ˆํ•œ๋‹ค. ์ฒซ์งธ๋Š” ํ˜„์žฌ์™€ ๊ฐ™์ด โ€˜์••์ˆ˜๋ฌผ์ธ ๋””์ง€ํ„ธ ์ €์žฅ๋งค์ฒด๋กœ๋ถ€ํ„ฐ ์ถœ๋ ฅํ•œ ๋ฌธ๊ฑด ๋“ฑโ€™(= โ€˜์ฆ๊ฑฐ๋ฐฉ๋ฒ•โ€™์— ํ•ด๋‹น, ์ฆ๊ฑฐ๋Šฅ๋ ฅ ์š”๊ฑด์œผ๋กœ์„œ ๋™์ผ์„ฑ, ๋ฌด๊ฒฐ์„ฑ, ์‹ ๋ขฐ์„ฑ ๋“ฑ ์ž…์ฆ์ด ํ•„์š”)์„ ์ฆ๊ฑฐ๋กœ ์ œ์ถœํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ, โ€˜0๊ณผ 1์ด๋ผ๋Š” ๋””์ง€ํ„ธ ํ˜•ํƒœ์˜ ์ •๋ณด ์ž์ฒดโ€™(=โ€˜์ฆ๊ฑฐ์ž๋ฃŒโ€™์— ํ•ด๋‹น)๋ฅผ ์ฆ๊ฑฐ๋กœ ์ˆ˜์ง‘ํ•˜์—ฌ ๋ฒ•์ •์— ์ œ์ถœํ•˜๋Š” ๋ฐฉ์•ˆ์ด๋‹ค. ์ด ๊ฒฝ์šฐ ๋””์ง€ํ„ธ ํ˜•ํƒœ์˜ ์ •๋ณด์ธ ํŒŒ์ผ ์ž์ฒด(1์ฐจ ์ฆ๊ฑฐ)์™€ ์ด๋ฅผ ๋ฌธ์„œ๋ทฐ์–ด ๋“ฑ ํ”„๋กœ๊ทธ๋žจ์œผ๋กœ ์žฌํ˜„ํ•œ ํ™”๋ฉด์ด๋‚˜ ๋ฌธ์„œ(2์ฐจ ์ฆ๊ฑฐ)๋ฅผ ํ•จ๊ป˜ ์ œ์ถœํ•˜๋Š”๋ฐ, ์ด๋Š” ์˜ˆ์ปจ๋Œ€ ์™ธ๊ตญ์–ด๋‚˜ ๊ธฐ์ˆ ๋ถ€ํ˜ธ๋กœ ๊ธฐ์žฌ๋œ ๋ฌธ์„œ(1์ฐจ ์ฆ๊ฑฐ)์™€ ์ด๋ฅผ ๋ฒˆ์—ญ ๋˜๋Š” ๊ฐ์ •ํ•œ ๊ฒฐ๊ณผ(2์ฐจ ์ฆ๊ฑฐ)๋ฅผ ํ•จ๊ป˜ ์ œ์ถœํ•˜๋Š” ๊ฒƒ์— ๋น„๊ฒฌ๋  ์ˆ˜ ์žˆ๋‹ค. ๋‘˜์งธ๋Š” ์œ„์™€ ๊ฐ™์ด 1์ฐจ ์ฆ๊ฑฐ๋กœ ์ œ์ถœํ•˜๋Š” ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ์ง„์ •์„ฑ์„ ํ™•๋ณดํ•˜๋Š” ๊ธฐ์ˆ ์  ๋ด‰์ธ๊ธฐ๋ฒ•์˜ ๊ฐœ์„  ๋ฐฉ์•ˆ์ด๋‹ค. ํ˜„์žฌ๋Š” ์ฆ๊ฑฐ์ž๋ฃŒ์ธ ํŒŒ์ผ ์ž์ฒด์— ๋Œ€ํ•œ ํ•ด์‹œ๊ฐ’์„ ์‚ฐ์ถœํ•˜์—ฌ ์ฐธ์—ฌ์ž์—๊ฒŒ ํ™•์ธ์„œ๋ฅผ ๊ต๋ถ€ํ•˜๋Š”๋ฐ, ํ•ด์‹œ๊ฐ’ ์‚ฐ์ถœ ๋Œ€์ƒ์— ์ฆ๊ฑฐ์ž๋ฃŒ์ธ ํŒŒ์ผ ์™ธ์— โ€˜๊ฐ๊ด€์ ์œผ๋กœ ๊ฒ€์ฆ ๊ฐ€๋Šฅํ•œ ํ•ด๋‹น ํŒŒ์ผ์˜ ์ˆ˜์ง‘์‹œ๊ฐโ€™์„ ํฌํ•จํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ํ•ด๋‹น ํŒŒ์ผ์˜ ์ˆ˜์ง‘์‹œ๊ฐ์„ ๊ณต์ธ๋œ ๋ฐฉ๋ฒ•์œผ๋กœ ํš๋“ํ•˜์—ฌ ํ•ด์‹œ ๋Œ€์ƒ์— ํฌํ•จ์‹œํ‚ค๋ฉด ์ˆ˜์ง‘ ํ˜„์žฅ์— ์ฐธ์—ฌ์ž๊ฐ€ ์—†๋”๋ผ๋„ ํ•ด๋‹น ํŒŒ์ผ์˜ ์ˆ˜์ง‘์‹œ๊ฐ์„ ๊ฐ๊ด€์ ์œผ๋กœ ๋ณด์žฅํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ ๊ธฐ์ˆ ์  ์ˆ˜๋‹จ์œผ๋กœ๋Š” NTP ๋˜๋Š” TSA ๋ฐฉ์‹์„ ๊ณ ๋ คํ•  ์ˆ˜ ์žˆ๋‹ค. ์…‹์งธ๋Š” ์œ„์™€ ๊ฐ™์€ ์ผ๋ จ์˜ ์ฆ๊ฑฐ์ˆ˜์ง‘ ๋ฐ ๋ถ„์„ ๊ณผ์ •์— ๋Œ€ํ•œ ์‹ ๋ขฐ๋ฅผ ํ™•๋ณดํ•˜๊ธฐ ์œ„ํ•˜์—ฌ, ํŒŒ์ผ ์ˆ˜์ง‘, ๋ถ„์„ ๋ฐ ์‹œ๊ฐ ํ™•์ธ ๋“ฑ์˜ ๋ชจ๋“  ์ ˆ์ฐจ๋ฅผ ์ˆ˜ํ–‰ํ•˜๋Š” ์‹œ์Šคํ…œ์„ ๊ฐ€์ƒ๋จธ์‹ ์œผ๋กœ ๊ตฌํ˜„ํ•˜๊ณ , ๊ทธ ๊ฐ€์ƒ๋จธ์‹ ์—์„œ ์ด๋ฃจ์–ด์ง€๋Š” ๋ชจ๋“  ํ–‰์œ„๋ฅผ ๊ธฐ๋กํ•œ ํ›„, ๊ฐ€์ƒ๋จธ์‹  ์ž์ฒด์— ๋Œ€ํ•œ ํ•ด์‹œ๊ฐ’๊ณผ ํ–‰์œ„๊ธฐ๋ก์— ๋Œ€ํ•œ ํ•ด์‹œ๊ฐ’์„ ์‚ฐ์ถœํ•˜์—ฌ ๋ณด์กดํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋กœ์จ ํฌ๋ Œ์‹ ์กฐ์‚ฌ ์ฃผ์ฒด ๋ฐ ์กฐ์‚ฌ ๊ณผ์ •์— ๋Œ€ํ•œ ์‹ ๋ขฐ๋ฅผ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด์ƒ๊ณผ ๊ฐ™์ด ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ์ˆ˜์ง‘, ์กฐ์‚ฌ์— ๊ด€ํ•œ ํ˜„ํ–‰ ์‹ค๋ฌด์ƒ ๋ฏธ๋น„์ ์— ๋Œ€ํ•œ ๊ฐœ์„ ๋ฐฉ์•ˆ์„ ์ด๋ก ์  ์ฐจ์›์—์„œ ๊ฒ€ํ† ํ•˜์˜€๋‹ค. ํ–ฅํ›„ ํ˜•์‚ฌ์ „์ž์†Œ์†ก์‹œ์Šคํ…œ์ด ์™„๋น„๋˜๋ฉด ๋ฒ•์ •์—์„œ ์ œ์•ˆ๋œ ๋ฐฉ์‹์˜ ์ฆ๊ฑฐ์กฐ์‚ฌ๊ฐ€ ์›ํ™œํžˆ ์ด๋ฃจ์–ด์งˆ ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค.1. ์„œ๋ก  1 2. ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ์ฆ๊ฑฐ๋Šฅ๋ ฅ 4 ๊ฐ€. ์ฆ๊ฑฐ๋ž€? 4 ๋‚˜. ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ๊ฐœ๋… 5 ๋‹ค. ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ํŠน์„ฑ 9 ๋ผ. ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ์ฆ๊ฑฐ๋Šฅ๋ ฅ ์š”๊ฑด 13 3. ํ˜„์žฌ ์ˆ˜์‚ฌ ๋ฐ ์žฌํŒ์‹ค๋ฌด์˜ ๋ฌธ์ œ์  24 ๊ฐ€. ๋ฌธ์ œ์ƒํ™ฉ ๋ฐ ๊ทธ ์›์ธ 24 ๋‚˜. ๋ณธ ์—ฐ๊ตฌ์˜ ์ œ์•ˆ๋‚ด์šฉ 25 4. ์ฆ๊ฑฐ์กฐ์‚ฌ ๋Œ€์ƒ์— ๋Œ€ํ•œ ์ธ์‹ ์ „ํ™˜ 28 ๊ฐ€. ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ๊ณ„์ธต ๊ตฌ์กฐ 28 ๋‚˜. ์ฆ๊ฑฐ๋ฐฉ๋ฒ•์ด ์•„๋‹Œ ์ฆ๊ฑฐ์ž๋ฃŒ ์ž์ฒด์— ๋Œ€ํ•œ ์กฐ์‚ฌ ๋ฐฉ์•ˆ 33 5. ๊ธฐ์ˆ ์  ๋ด‰์ธ๊ธฐ๋ฒ•์˜ ๊ฐœ์„  37 ๊ฐ€. ํ˜„์žฌ์˜ ์‹ค๋ฌดํ˜„ํ™ฉ 37 ๋‚˜. ํ•ด์‹œ ํ•จ์ˆ˜์˜ ํ™œ์šฉ๊ณผ ๊ทธ ํ•œ๊ณ„ 41 ๋‹ค. ๊ฐœ์„ ๋ฐฉ์•ˆ 49 6. ํฌ๋ Œ์‹ ์กฐ์‚ฌ ์ฃผ์ฒด ๋ฐ ๊ณผ์ •์— ๋Œ€ํ•œ ์‹ ๋ขฐ ํ™•๋ณด 53 ๊ฐ€. ํ˜„์žฌ ์‹ค๋ฌดํ˜„ํ™ฉ๊ณผ ๋ฌธ์ œ์  53 ๋‚˜. ๊ฐœ์„ ๋ฐฉ์•ˆ 53 7. ๊ฒฐ๋ก  56 ์ฐธ๊ณ ๋ฌธํ—Œ 58 Abstract 62Maste

    The Direction and Task of Unification Education Under the Present Internal and External Unification Circumstances

    No full text
    ๋‚จ๋ถํ•œ์€ 2000๋…„ ๋‚จ๋ถ ์ •์ƒ์˜ 6.15 ๋‚จ๋ถํ•œ ๊ณต๋™ ์„ ์–ธ์„ ํ†ตํ•ด ์ƒˆ๋กœ์šด ์ „๊ธฐ๋ฅผ ๋งˆ๋ จํ•˜์˜€๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ˜„์žฌ ๋‚จ๋ถํ•œ์˜ ๊ด€๊ณ„๋ฅผ ๋ฐ”๋ผ๋ณด๋Š” ์šฐ๋ฆฌ ๋‚จํ•œ ์‚ฌํšŒ์˜ ์ธ์‹์€ ์•„์ง๋„ ํ˜ผ๋ˆ ๊ทธ ์ž์ฒด์ด๋‹ค. ๋‹ค์–‘ํ•œ ์‚ฌํšŒ์  ์ธ์‹์„ ๋ฐ”ํƒ•์œผ๋กœ ํ•œ ํ†ต์ผ๊ต์œก์€ ํ‰ํ™”์™€ ์•ˆ๋ณด์˜ ๋‘ ๊ฐœ ์ž๋Œ€๋กœ ์ด๋ฃจ์–ด์ง€๋Š” ํ–ฅ๋ฐฉ์—์„œ ์ƒ๋‹นํžˆ ์–ด๋ ค์šด ์ž…์žฅ์— ์ฒ˜ํ•ด ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ธก๋ฉด์—์„œ ์šฐ๋ฆฌ์˜ ํก์ˆ˜ ํ†ต์ผ, ์ž์œ  ๋ฏผ์ฃผ์ฃผ์˜๋กœ์˜ ํ†ต์ผ ๋ฐฉ์•ˆ์€ ๋ถํ•œ๊ณผ์˜ ๊ธด์žฅ์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ตญ๋‚ด์˜ ๋ณด์ˆ˜ ์„ธ๋ ฅ์„ ์„ค๋“ํ•˜์ง€ ์•Š์€ ๋‚จ๋ถํ•œ ์ •๋ถ€ ๋ฐ ๋ฏผ๊ฐ„์˜ ์ ‘์ด‰์€ ๋‚จํ•œ ์‚ฌํšŒ ๋ณด์ˆ˜์ธต์˜ ์˜ํ˜น์„ ๊ฐ€์ค‘์‹œํ‚ฌ ๊ฒƒ์ด๋‹ค. ๋”ฐ๋ผ์„œ ํ†ต์ผ๊ต์œก์€ ๋ณด์ˆ˜์  ์‹œ๊ฐ์ด๋‚˜ ์ง„๋ณด์  ์‹œ๊ฐ์„ ์•„์šฐ๋ฅด๊ณ  ์ˆ˜๋ ดํ•˜๋Š” ๋Œ€ํ™”์™€ ์‹ค์ฒœ์„ ์ด๋ฃจ๋ ค๋Š” ๋‚ด์šฉ์„ ๊ฐ€์ ธ์•ผ ํ•œ๋‹ค. ๊ทธ๋Ÿฌํ•œ ๋ฐ”ํƒ•์—์„œ ํ†ต์ผ๊ต์œก์€ ๋‚จ๋ถํ•œ ์ดํ•ด ๊ต์œก, ๊ต์œก ์ˆ˜์š”์ž์˜ ๋ฏธ๋ž˜ ์ง€ํ–ฅ์  ์•ˆ๋ณด๊ต์œก, ๋ณดํŽธ ์ง€ํ–ฅ์  ๋ฏผ์กฑ๊ต์œก์„ ์ฃผ์š”ํ•œ ๋‚ด์šฉ์œผ๋กœ ์ „๊ฐœ๋˜์–ด์•ผ ํ•œ๋‹ค. South and North Korea held the first summit meeting last year. "The June 15 South-North Joint Declaration" gave a blueprint for Korea's unification and was a turning point in the conflicts between the two Koreas. Yet we have difficulty in establishing peace. There are different opinions among the Republicans in the United States and the conservatives in Korea over the North Korea's missile programs. A lot of Korean people are skeptical about the return visit by North Korean leader, Kim Jung-Il. They think that the plan may help the two Koreas reach peaceful reconciliation, but they apprehend that it may cause conflicts between conservative groups and progressive ones. Many people criticize that Kim Dae-jung government is too soft in dealing with the North and haste a good relation between south & north koreans. I don't think that Kim Dae-jung government will dialog with the opposite leaders on the North Korea and unification issues. This also applies to unification education. Only some of school teachers show interest in Korea's unification. The reason is that we still hold the conservative way of thinking about North Korea and that we fail to reach a national consensus on unification. So external circumstances, especially U.S.' North Korea policy tend to be a dependent variable in divided Korea. Unification education should give South Korean people a vision on reconciliation with the N. Korean people and lead Korea to one unified state. So specialists in unification education must give national conviction to people that the unification is indispensable and realistic. They ought to help them critically understand the reality of North Korea. All unification debates must be open to the general public. Unification itself must be achieved by the peaceful nation with power. So specialists in unification education should teach both students and our people to live their life for peace, security, and the brighter future of Korea despite internal and external obstacles in the path of national unification

    (A) Study on the Effects of the Leadership Types of Volunteer Fire-Fighters Chief on the Organizational Commitment : Setting the Trust on Leaders as a Intervening Variable

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) --์„œ์šธ๋Œ€ํ•™๊ต ํ–‰์ •๋Œ€ํ•™์› :ํ–‰์ •ํ•™๊ณผ(ํ–‰์ •ํ•™์ „๊ณต),2009.8.Maste

    Pb(Znโ…“Nbโ…”)Oโ‚ƒ๋‹จ๊ฒฐ์ • ์„ฑ์žฅ ๋ฐ ๊ฐ•์œ ์ „ ๋ถ„์—ญ๊ตฌ์กฐ ๊ด€์ฐฐ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๋ฌด๊ธฐ์žฌ๋ฃŒ๊ณตํ•™๊ณผ,1998.Maste

    A Study on the transition of unification education in Korea

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ตญ๋ฏผ์œค๋ฆฌ๊ต์œก๊ณผ,1998.Docto
    corecore