• Title/Summary/Keyword: 증거 자료

Search Result 465, Processing Time 0.028 seconds

A Study on the University Archives: The Concept and Contents of University Archives (대학 Archives란 무엇인가: Archives의 개념과 내용)

  • 전상숙
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.2
    • /
    • pp.289-306
    • /
    • 2001
  • This paper seeks to know a out the 'University and College Archives', which are to be established under the provision of 'the Law on the Management of the Institutions', and briefly mention the relation with the library, looking into the concept and backgrounds of archives. The enactment of the law became the ground to establish but there is no practical guidelines on the structure, formation, management, and contents of archives, even worse, people do not know well what the archives is. Therefore, I think so know about academic archives should start understanding basic concept, meaning, and necessities of the archives. In Europe, university archives have been established from 1830s, after the other archives had been established. In America, universities, which had been grown owe to the rapid economic development and the increasing of high educated people, began to establish their archives as a way to invest to improve their being and promote continuing growth. This is to prove their being and value in the society by collecting and preserving records and documents produced in the development of universities. Therefore, university archives can be said that it is the receiving agency for the producers of the university records, researching functional purpose, contents of university records, and relation with other institutions or records. This is the very difference from university libraries as collecting agencies. Nevertheless, university libraries and archives can help each other to activate their functions and improve their positions in universities through cooperating for the policy of digital records preserving and approaching them because the tendency of informationization forces universities to stand on various information resources to serve for routine university works. Each institutions of universities needs archival records due to various reasons. It is especially necessary to preserve and manage archival records to prove the confidence of records.

  • PDF

Proving Causation With Epidemiological Evidence in Tobacco Lawsuits (담배소송에서 역학적 증거에 의한 인과관계의 증명에 관한 소고)

  • Lee, Sun Goo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.2
    • /
    • pp.80-96
    • /
    • 2016
  • Recently, a series of lawsuits were filed in Korea claiming tort liability against tobacco companies. The Supreme Court has already issued decisions in some cases, while others are still pending. The primary issue in these cases is whether the epidemiological evidence submitted by the plaintiffs clearly proves the causal relationship between smoking and disease as required by civil law. Proving causation is difficult in tobacco lawsuits because factors other than smoking are involved in the development of a disease, and also because of the lapse of time between smoking and the manifestation of the disease. The Supreme Court (Supreme Court Decision, 2011Da22092, April 10, 2014) has imposed some limitations on using epidemiological evidence to prove causation in tobacco lawsuits filed by smokers and their family members, but these limitations should be reconsidered. First, the Court stated that a disease can be categorized as specific or non-specific, and for each disease type, causation can be proven by different types of evidence. However, the concept of specific diseases is not compatible with multifactor theory, which is generally accepted in the field of public health. Second, when the epidemiological association between the disease and the risk factor is proven to be significant, imposing additional burdens of proof on the plaintiff may considerably limit the plaintiff's right to recovery, but the Court required the plaintiffs to provide additional information such as health condition and lifestyle. Third, the Supreme Court is not giving greater weight to the evidential value of epidemiological study results because the Court focuses on the fact that these studies were group-level, not individual-level. However, group-level studies could still offer valuable information about individual members of the group, e.g., probability of causation.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

Forensic data extracts of Android and Windows Mobile O.S. Smart Phone (Google Android와 Windows Mobile Smart Phone의 포렌식 자료 추출)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.235-239
    • /
    • 2010
  • Use of mobile phones reached saturation point, the recent use of the iPhone, including the Smart Phone is increasing rapidly. How to extract forensic data from current mobile phones and SYN, JTAG, Revolving There are three ways. Mobile phone and Smart Phone, but the technology and how to use forensic data because of the difference must have different extraction methods. In this paper, in the Smart Phone will study how to extract forensic data. Commonly used in the Google Android Smart Phone and Windows Mobile Smart Phone OS in the specification and analysis for analysis, the data analysis. Also, Google Android and Windows Mobile Smart Phone to extract forensic data to generate evidence. The present study tested the Mobile Smart Phone technology research will contribute to the development of forensic techniques.

  • PDF

A Qualitative Study on Intervening Work Experiences of Hospital-Based Child Protection Team on Child Abuse Death Cases (병원 학대피해아동보호팀의 아동학대 사망사건 개입경험 연구)

  • Kim, Kyunghee;Lee, Heeyoun;Chung, Ickjoong;Kim, Jihae;Kim, Sewon
    • Korean Journal of Social Welfare
    • /
    • v.65 no.4
    • /
    • pp.61-88
    • /
    • 2013
  • The aim of this study was to explore the work experiences of hospital-based child protection team staffs who had intervened the child abuse cases resulting in death. In order to gather the relevant data, all 62 child protection teams registered nationwide were contacted and 5 teams which had actually experienced at least one child abuse deaths were found. The staffs (hospital social workers and doctors) who belonged to these teams were intensively interviewed, and the interviewed materials were thoroughly analyzed by qualitative research methodology. The result showed that treatment delay was the most important obstacle to prevent unnecessary deaths of the victims. Some abused victims were sent to the hospital only after their physical condition had so gravely deteriorated. In other cases, custodians' bland denial or refusal to treatment made impossible the timely intervention to save the child lives. Nevertheless, child protection team staffs' reasonable suspicion and active intervention could sometimes uncover the hidden truth that child abuse was the actual cause of death. These incidents were regarded as a team's meaningful accomplishments by team members. Meanwhile, lack of awareness and excessive burden about the role and responsibility of mandated reporter precluded medical staffs' active involvement. Also, substantiating the abuse suspicion by securing positive evidences was found to be a facilitatory factor for the rapid public intervention. On the basis of these results, several practice and policy implications were discussed to improve the early detection process, securing evidence and uncovering the actual cause of death in child abuse deaths.

  • PDF

A Study on Proving RMF A&A in Real World for Weapon System Development (무기체계 개발을 위한 RMF A&A의 실증에 관한 연구)

  • Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.817-839
    • /
    • 2021
  • To manage software safely, the military acquires and manages products in accordance with the RMF A&A. RMF A&A is standard for acquiring IT products used in the military. And it covers the requirements, acquisition through evaluation and maintenance of products. According to the RMF A&A, product development activities should reflect the risks of the military. In other words, developers have mitigated the risks through security by design and supply chain security. And they submit evidence proving that they have properly comply with RMF A&A's security requirements, and the military will evaluate the evidence to determine whether to acquire IT product. Previously, case study of RMF A&A have been already conducted. But it is difficult to apply in real-world, because it only address part of RMF A&A and detailed information is confidential. In this paper, we propose the evidence fulfilling method that can satisfy the requirements of the RMF A&A. Furthermore, we apply the proposed method to real-world drone system for verifying our method meets the RMF A&A.

A Design of Secure Audit/ Trace Module to Support Computer Forensics (컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈 설계)

  • 고병수;박영신;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.79-86
    • /
    • 2004
  • In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This Paper Proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator These data will going to utilize to computer forensics' data that legal confrontation is Possible.

  • PDF

Multidimensional Networking Application of Ship Black Box and Forensic Data Extraction (다차원 네트워킹을 적용한 선박 블랙박스에서 Forensic자료 생성)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.387-390
    • /
    • 2009
  • Digital devices that apply Ubiquitous-IT Convergence in ship manufacture are used as ship automation device. Need sailing data recording of ship black box that equip integrity and consecutiveness as legal confesser fare that inquire responsibility whereabouts of disaster such as fire of ship. It is research that create Forensic data from ship black box using Multidimensional networking that use ZigBee radio short distance communications division Wireless LAN with short distance RFID sensor that is used in ship in this treatise, UWB communication, GPS and artificial satellite. Sailing recording of shipping that is recorded to black box is transmited, and stores doubly by real time on ship insurance company and ship administration recording membrane using SHA-1 hash function and secure consecutiveness and integrity as Forensic data through artificial satellite encoding by 3DES 1024bit.

  • PDF

Trade Liberalization, Growth, and Bi-polarization in Korean Manufacturing: Evidence from Microdata (우리나라 제조업에서 무역자유화가 성장 및 양극화에 미치는 영향: 미시자료를 통한 실증적 증거들)

  • Hahn, Chin Hee
    • KDI Journal of Economic Policy
    • /
    • v.35 no.4
    • /
    • pp.1-29
    • /
    • 2013
  • This paper examines the effect of trade liberalization or globalization, more broadly, on plants' growth as well as on "bi-polarization". To do so, we reviewed the possible theoretical mechanisms put forward by recent heterogeneous firm trade theories, and provided available micro-evidence from existing empirical studies on Korean manufacturing sector. Above all, the empirical evidence provided in this paper strongly suggests that globalization promoted growth of Korean manufacturing plants. Specifically, evidence suggests that exporting not only increases within-plant productivity but also promotes introduction of new products and dropping of old products. However, the empirical evidence also suggest that globalization has some downsides: widening productivity differences across plants and rising wage inequality between skilled and unskilled workers. Specifically, trade liberalization widens the initial productivity differences among plants through learning from export market participation as well as through interactions between exporting and R&D, both of which increase plants' productivity. We also show that there is only a small group of large and productive "superstar" plants engaged in both R&D and exporting activity, which can fully utilize the potential benefits from globalization. Finally, we also show evidence that trade liberalization interacts with innovation to increase the skilled-unskilled wage inequality.

  • PDF

A Modeling of Forensics for Mobile IP Spoofing Prevention (모바일 IP 스푸핑 방지를 위한 포렌식 설계)

  • Park, Sun-Hee;Yang, Dong-Il;Jin, Kwang-Youn;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.307-317
    • /
    • 2012
  • Rapid development of the IT technology and mobile communications has increasingly improved many kinds of digital devices arise, as well as the mobile technology. However, the attacks (virus, hacking and Ip spoofing etc) have also increasingly grown dogged on any region including the society security. As the visual data is prone to copy, delete and move etc, it is necessary that attesting to the integrity of forensics evidence is crucial, as well as data transmission security. This paper presents a framework model using digital forensics method and the results of its performance evaluation for mobile security. The results show that the integrity of the visual data can be obtain with high security and make a proposal refer to prevention of Mobile IP Spoofing attack using our hashing data.