• Title/Summary/Keyword: 수사

Search Result 808, Processing Time 0.027 seconds

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.

The Rhetoric of Revelation and the Politics of Prophecy: A Reading of Ginsberg's "Howl" and "Kaddish" (계시의 수사와 정치학-긴즈버그의 「울부짖음」과 「캐디쉬」를 중심으로)

  • Son, Hyesook
    • Journal of English Language & Literature
    • /
    • v.57 no.4
    • /
    • pp.529-552
    • /
    • 2011
  • My essay aims at reading Ginsberg's "Howl" and "Kaddish" with the concept of 'shaman-prophet-poet' to illustrate the dynamic relationship between his poetics and radical politics. Throughout his widely-ranging career, Ginsberg represents himself as a poet-prophet and commands a typical rhetoric of revelation as a way of decentering Cold War orthodoxies. While well aware of the oppressive and pervasive power of the dominant post-war ideologies, he adopts 'madness' to oppose conventional political, social, and religious institutions; by way of entering into the madness of this world and actively engaging himself as a victim, he can finally heal both himself and the world. This dual function of poet characterizes his rhetoric of revelation, but it doesn't appeal to the mainstream of American critical ideology where the post-structural approach to language and subject gives a skeptical look at any account of active human agency and humanistic belief in the possibility of language. In "Howl" and "Kaddish," Ginsburg persuades the reader of the truth of his own vision through the convincing and realistic portraits of his contemporaries as well as his own mother and family. Different from his visionary predecessors such as Emerson and Whitman, Ginsberg knew the difficulty of a negotiation between history and divine vision, and attempted to imbricate his family, friends, and even the larger social and political units within his visionary experience in order to avoid naive idealism, escapism, or solipsism. Furthermore, he deconstructs the Logos of Western prophecy and replaces it with the groundless identity and the nontheistic epistemology of Buddhism, which, in turn, leads to emptying his powerful language of absolutist meaning and prevents his prophecy from becoming re-reified as divine essentialism. Ginsberg's idea of poet and poem revitalizes the skeptical view on language and literary representation of our contemporary critical community which is unwilling to engage the experimental scope of his radical prophecy.

Profile Analysis of Bacteria in Human Hands Using the Terminal Restriction Fragment Length Polymorphism (T-RFLP) Analysis (제한효소 절편길이 다형성(T-RFLP) 분석기법을 이용한 손에 서식하는 세균의 군집조성 분석)

  • Park, Jisun;Kim, Seung Bum
    • Journal of Science Criminal Investigation
    • /
    • v.11 no.4
    • /
    • pp.276-282
    • /
    • 2017
  • As evidence that can be obtained at the crime scene, the importance of micro-evidences has been recognized in recent years with the development modern molecular-level analytical techniques. These micro-evidences include substances useful for personal identification such as DNA, but it is difficult to collect only the evidences showing individual characteristics every time at the crime scene. Therefore, development of new research approaches for the discovery and application of micro-evidence candidates is in increasing demand. For this purpose, skin microbial communities of bacteria inhabiting the palms of 16 people were collected and terminal-restriction enzyme fragment length polymorphism (T-RFLP) analysis was carried out to examine the potential for the application in personal identification. As a result, 16 different electropherograms were obtained, and various taxa including Staphylococcus and Bacillus were shown to produce different T-RF profiles among individuals. These results were analyzed with the factors affecting the microbiota such as sex and working environment of individuals.

A Study on the Secure Key Escrow System (안전한 키 위탁 시스템에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.83-92
    • /
    • 1999
  • Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.

Cannabinol Synthase Gene Based Molecular Markers for Identification of Drug and Fiber Type Cannabis sativa (마약성과 비마약성 대마 품종의 식별을 위한 카나비놀 생합성 유전자 분석법)

  • Park, Hyun-Seung;Oh, Hye Hyun;Kim, Sungmin;Park, Jee Young;Kim, Jintae;Shim, Hyeonah;Yang, Tae-Jin
    • Korean Journal of Pharmacognosy
    • /
    • v.52 no.2
    • /
    • pp.69-76
    • /
    • 2021
  • Cannabis sativa is an important industrial plant utilized to produce fiber, oil, and medicinal ingredients. A chemotype of cannabis is divided into "Drug type" with predominance of tetrahydrocannabinolic acid (THCA) and "Fiber type" with cannabidiolic acid (CBDA). To develop molecular markers for the discrimination of these two types, nucleotide sequences of THCA synthase and CBDA synthase as well as their pseudogenes were retrieved from the recently published cannabis genome in chromosome scale. Gene-specific SNPs were discovered by multiple alignment of these sequences, and 2 dominant marker sets from each gene were designed for selective amplification. Our markers successfully identified "Drug type" and "Fiber type" cannabis plants as well as forensic samples including processed materials. Our molecular markers will provide a fast and efficient system for molecular-based identification of the cannabis plant.

Comparison of aging fingerprint enhancement by pre-treatment of various initiator powders in the cyanoacrylate fuming method (다양한 개시제(initiator)분말 전처리(pre-treatment)를 통한 노화된 지문의 Cyanoacrylate Fuming법 현출 증강 비교)

  • Kim, Kyung-Soo;Lee, Yoon-Jeong;Seo, Kyung-Suk
    • Analytical Science and Technology
    • /
    • v.35 no.3
    • /
    • pp.129-135
    • /
    • 2022
  • We tested the pre-treatment of alumina, leucine, alumina mixed with leucine at ratios of 9:1 (Al-Leu (9:1)) and 5:1 (Al-Leu (5:1)), and alumina mixed with sodium lactate at a ratio of 5:1 (Al-Lac (5:1)) on aged fingerprints (1, 7, 14, and 30 days after natural fingerprinting) before cyanoacrylate (CA) fuming to improve the development efficacy. As a result of the experiment, fingerprints with pre-treatment of alumina, leucine, Al-Leu (9:1), Al-Leu (5:1), and Al-Lac (5:1) showed better development efficacy (area and minutiae) than fingerprints without pre-treatment. Therefore, this modified CA fuming method improved the development efficacy with five pretreatments.

Forensic Analysis of Element Instant Messenger Artifacts (포렌식 관점에서의 Element 인스턴트 메신저 아티팩트 분석)

  • Cho, Jae-min;Byun, Hyeon-su;Yun, Hui-seo;Seo, Seung-hee;Lee, Chang-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1113-1120
    • /
    • 2022
  • Recently, the investigation has been difficult due to the emergence of messengers that encrypt and store data for the purpose of protecting personal information and provide services such as end-to-end encryption with a focus on security. Accordingly, the number of crime cases using security messengers is increasing, but research on data decoding for security messengers is needed. Element security messengers provide end-to-end encryption functions so that only conversation participants can check conversation history, but research on decoding them is insufficient. Therefore, in this paper, we analyze the instant messenger Element, which provides end-to-end encryption, and propose a plaintext verification of the history of encrypted secure chat rooms using decryption keys stored in the Windows Credential Manager service without user passwords. In addition, we summarize the results of analyzing significant general and secure chat-related artifacts from a digital forensics investigation perspective.

A Study on the Characteristics and Progress of New Voice Phishing Based on Psychological Descriptions (심리적 기재를 기반으로 한 신종 보이스피싱의 특성 및 진행과정에 관한 연구)

  • SeiYouen Oh;HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.510-518
    • /
    • 2023
  • Purpose: This study compares and analyzes the characteristics and progress of existing voice phishing and new voice phishing to present a basic policy plan to prepare countermeasures against new voice phishing based on psychological descriptions. Method: The criminal progress and characteristics of the two were compared and analyzed through damage cases on various portal sites centered on voice phishing crime scenarios. Result: As a result of analyzing the progress of the third stage of new voice phishing, the scenario of new voice phishing that can deceive victims was written more carefully and the scope of the crime was expanded. In the crime execution stage, the victim was socially isolated, reducing the victim's judgment ability, making it more difficult for investigative agencies to investigate, and in the final stage, the continuity and expansion of criminal damage such as extortion of money and valuables are shown. Conclusion: There were differences in the target and scope of the crime and the method of the crime strategy between the two, and the possibility of damage is much greater, so a more efficient response strategy should be prepared.

Assessment of water supply stability in Yeongsan river basin by river water use using MODSIM-DSS (MODSIM-DSS를 이용한 영산강유역의 하천수 사용에 따른 용수공급 안정성 평가)

  • Kim, Sehoon;Lee, Jiwan;Jung, Chunggil;Kim, Wonjin;Kim, Seongjoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.107-107
    • /
    • 2021
  • 본 연구에서는 유역간 물 공급 및 분배 모형인 MODSIM-DSS를 이용하여 영산강 유역(3,371.4 km2)의 전반적인 용수공급 능력을 평가하고, 용수부족 발생 시 하천수사용허가를 통한 용수부족 완화 평가를 수행하였다. MODSIM-DSS 설계 시 생공 및 농업용수 수요량을 고려하여 8개의 중권역으로 구분하였으며, 모형의 유역별 유입량(공급량) 자료는 SWAT 모형의 소유역별 유출 결과를 사용하였다. MODSIM-DSS를 통한 41개년(1980~2020) 동안의 물수지 분석을 수행한 결과 생공용수의 공급능력은 95.4~100%, 농업용수의 공급능력은 57.1~85.8%로 생공용수의 공급 능력이 가장 높은 것으로 분석되었다. 실제 연평균 강수량 898.3 mm로 가뭄 해였던 1988년의 경우, 생공 및 농업용수 부족량은 각각 16×106m3, 457.5×106m3로 분석되었으며 41개년 중 생공용수부족이 가장 크게 나타났다. 농업용수의 경우 457.5×106m3 이상 발생한 연도는 1983년, 1994년, 1995년, 2015년, 2017년으로 각각 463.0×106m3, 485.6×106m3, 531.4×106m3, 484.5×106m3, 459.1×106m3로 분석되었으며, 농업용수 공급가능률은 41개년 평균 71.7%보다 낮은 62.6%, 60.8%, 57.1%, 60.9%, 62.9%로 나타났다.

  • PDF

Effect of Cr/Ti/Al Elements on High Temperature Oxidation Behavior of a Ni-Based Superalloy with Thermal Exposure (고온 노출 니켈기 초내열합금 터빈 블레이드의 Cr/Ti/Al 성분이 고온 산화에 미치는 영향)

  • Byung Hak Choe;Sung Hee Han;Dae Hyun Kim;Jong Kee Ahn;Jae Hyun Lee;Kwang Soo Choi
    • Korean Journal of Materials Research
    • /
    • v.33 no.2
    • /
    • pp.77-86
    • /
    • 2023
  • High-temperature oxidation of a Ni-based superalloy was analyzed with samples taken from gas turbine blades, where the samples were heat-treated and thermally exposed. The effect of Cr/Ti/Al elements in the alloy on high temperature oxidation was investigated using an optical microscope, SEM/EDS, and TEM. A high-Cr/high-Ti oxide layer was formed on the blade surface under the heat-treated state considered to be the initial stage of high-temperature oxidation. In addition, a PFZ (γ' precipitate free zone) accompanied by Cr carbide of Cr23C6 and high Cr-Co phase as a kind of TCP precipitation was formed under the surface layer. Pits of several ㎛ depth containing high-Al content oxide was observed at the boundary between the oxide layer and PFZ. However, high temperature oxidation formed on the thermally exposed blade surface consisted of the following steps: ① Ti-oxide formation in the center of the oxide layer, ② Cr-oxide formation surrounding the inner oxide layer, and ③ Al-oxide formation in the pits directly under the Cr oxide layer. It is estimated that the Cr content of Ni-based superalloys improves the oxidation resistance of the alloy by forming dense oxide layer, but produced the σ or µ phase of TCP precipitation with the high-Cr component resulting in material brittleness.