• Title/Summary/Keyword: Collecting evidence

Search Result 92, Processing Time 0.021 seconds

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

The Impact of National Stereotypes towards Country-of-Origin Images on Purchase Intention: Empirical Evidence from Countries of the Belt and Road Initiative

  • WANG, Li;SHEN, Xiangdong;YAN, Lei
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.1
    • /
    • pp.409-422
    • /
    • 2022
  • The purpose of this paper is to explore how the country-of-origin image mediates the effect of national stereotypes along two dimensions of perceived competence and warmth, on consumers' consumption behaviors, especially in today's environment, the capricious COVID-19 and the deepening and expanding "The Belt and Road" initiative. Research design, data, and methodology: After collecting 1500 primary data from twelve countries along the 21st - Century Maritime Silk Road, this paper conducts ANOVA and SEM in SPSS25.0 and AMOS 24.0 separately to analyze measurements, structural models, and hypotheses via using 1277 final samples. The mediation results illustrate the asymmetric dominance of the two dimensions of national stereotypes, indicating that the country-of-origin image shows the complementary mediation in the effect of perceived competence on purchase intention; whereas, the country-of-origin image holds the indirect-only mediation in the impact of perceived warmth on purchase intention. The results of the moderation show that the effect of country-of-origin image on purchase intention is more significant for consumers who perceive COVID-19 in China to be of lesser severity than those who believe it to be of higher severity. Based on the paper's results, some implications for practice and theory are highlighted.

Factors Reducing Credit Card's Perceived Risk in Retail Payment: An Approach to Consumer Traits

  • Nam Hoang TRINH;Hong Ha TRAN
    • Journal of Distribution Science
    • /
    • v.21 no.11
    • /
    • pp.67-75
    • /
    • 2023
  • Purpose: The study is focused on understanding consumer behaviour related to credit card use in retail payment or identifying factors that influence risk perception. Research design, data and methodology: Based on data collecting from structured self-administered questionnaires of 247 Vietnamese bank account payers, this study uses the Cronbach alpha analysis, the factor analyses, the structural equation modeling to assess the research's measurement model and structural model with the presence of knowledge, propensity to trust, self-efficacy, risk perception, intended use and their complex, intertwined relationships. Results: The results reveal that customer's perceived risk, which is affected by their self-efficacy and propensity to trust, negatively impact on their intended use of credit cards in retail payment. However, there is no evidence of the significant influence of consumer knowledge on how they assess potential losses of credit card. Conclusions: These findings provide a better understanding of consumer risk perception, its antecedents and consequence in a direction of credit card adoption. Bank managers or marketers should focus on increasing the information about credit cards and issues related to credit card use in retail payment, promoting mechanisms to encourage customers to participate in the credit card experience.

Analysis of Achievement Standards, Activities, and Assessment Items in the 2015 Revised Science Curriculum and Grade 7 Science Textbooks: Focusing on Science Core Competencies (2015 개정 과학과 교육과정에 제시된 중학교 1학년 성취기준과 과학 1 교과서에 포함된 활동과 평가 문항 분석: 과학과 핵심역량 중심으로)

  • Yun, Doun;Choi, Aeran
    • Journal of the Korean Chemical Society
    • /
    • v.63 no.3
    • /
    • pp.196-208
    • /
    • 2019
  • This study analyzed achievement standards in the 2015 revised Science Education Standards as well as activities and assessment items in grade 7 science textbooks using science core competencies and subcomponents. Scientific participation and lifelong learning capacity was not involved in the achievement standards. Logical thinking of scientific thinking capacity, planning and carrying out investigation, analyzing and interpreting data, developing and using models, and constructing explanation of scientific inquiry capacity, collecting and selecting information of scientific problem solving capacity, and using various communication methods of scientific communication capacity were involved in the achievement standards. All five scientific core competencies including all subcomponents except rational decision making of scientific problem solving capacity and understanding and coordinating diverse thoughts of scientific communication capacity were involved in activities of science textbooks. All five scientific core competencies were involved in assessment items of science textbooks. Logical thinking and creative thinking of scientific thinking capacity, planning and carrying out investigation and constructing explanation of scientific inquiry capacity, identifying problems, collecting and selecting information, suggesting solutions, and performing of scientific problem solving capacity, using various communication methods, arguing based on evidence of scientific communication capacity, and being interested in science technology and society issues of scientific participation and lifelong learning capacity.

Requirements of a Science Teachers' Professional Development Programme and a Possible Model (과학 교사의 전문성 계발 프로그램의 조건과 모형)

  • Kim, Hee-Kyong
    • Journal of Korean Elementary Science Education
    • /
    • v.26 no.3
    • /
    • pp.295-308
    • /
    • 2007
  • The purpose of the study is to develop an effective model of a science teachers' professional development program. This study consists of two parts: (1) the theoretical review of science teachers' professional development and (2) a case study of a science teachers' professional development programme in the UK. After reviewing recent research on pedagogical content knowledge and new approaches to educational research, the following suggestions emerged: (1) Continuing Professional Development(CPD) should be embedded in teachers' real practice in the classroom and (2) embedded in the everyday life of learners' within the community. (3) CPD should support the development of teachers' communities of professional practice. The case study of 'CPD through Portfolios of Evidence' in the British programme indicated that collecting explicit evidence of good practice in the classroom and establishing agreement as to what constitutes good practice in a teachers' community helped teachers' professional development. Finally, what emerged from the case study of the CPD programme in the UK and the theoretical review of PCK was the following. An effective CPD model of science teachers should comprise these three stages: (1) providing opportunities of professional development, (2) changing practice in the classroom and research, and (3) spreading and sustaining change. The whole process is circular.

  • PDF

The Effect of Organizational Justice on the Organizational Commitment of Police Investigators - Focusing on the Mediating Effect of Trust of Supervisors - (수사경찰의 조직공정성이 조직몰입에 미치는 영향 -상사신뢰의 매개효과를 중심으로-)

  • Han, Jin-Tae;Kwack, Dae-Gyung
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.159-183
    • /
    • 2020
  • The court in Korea values evidence justice, and also demands justification for the process of collecting evidence. Therefore, it is necessary to raise the level of organizational commitment, which means that the police investigators performing these tasks feel attached to the police organization they belong to, and that they feel united about the goals of the organization. Based on this recognition, the study analyzed the effects of the police's perception of organizational Justice on organizational commitment, and classified organizational Justice into distributive Justice, procedure Justice and interaction Justice. Therefore, this study analyzes the effect of the police's perception of organizational Justice on organizational commitment and verifies the effect through multiple regression analysis by injecting the trust of Supervisors into a mediating variable. The study was also conducted on the assumption that the trust of Supervisors is important in carrying out the field investigators work in the South Korean police. To achieve the purpose of this research, a total of three surveys were conducted from May 2017 to October 2019 at the National Police Agency using the selection process of investigators and job training courses for the national police, and a total of 500 copies were used as analysis data. Looking at the results analysis of this study, first, it was found that there was a statistically significant static (+) effect on organizational commitment, where the organizational Justice of police officers was a independent variable. Second, the relationship between organizational Justice and organizational commitment has shown that the trust of Supervisors has a mediating effect in korean police organization.

A Meta Study on Research Trend of Digital Forensic in Korea (메타스터디를 통한 국내 디지털 포렌식 연구 동향)

  • Kwak, Na-Yeon;Lee, Choong C.;Maeng, Yun-Ho;Cho, Bang-Ho;Lee, Sang-Eun
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.91-107
    • /
    • 2017
  • Digital forensics is the process of uncovering and interpreting electronic data and materials found in digital device in relation to crime. The goal of the process is to preserve any evidence in its most original form which shall be having the force of law. The digital forensic market is increasing with a growth of ICT in domestic and global market. Many countries including U.S. are actively performing researched regarding a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events which so does in academic society in Korea. This paper is to understand overall research trend about digital forensics and derive future strategy by integrating the result of meta-analysis into practices based on five criteria - main theme and topic, analysis phase, technical method for analysis, author's affiliation, and unit of analysis and method. 239 papers are analyzed, which were selected out of 470 papers published for 10 years (2007~2016) in academic journal on the list of KCI (Korea Citation index). The results of this analysis will be used to examine the characteristics of research in the field of digital forensics. The result of this research will contribute to understanding of the research trend and characteristics leading the technology-driven academia, through which measures for further research development and facilitation are suggested.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Study on the EDA based Statistics Attributes Discovery and Utilization for the Maritime Safety Statistics Items Diversification (해상안전 통계 항목 다양화를 위한 EDA 기반 통계 속성 도출 및 활용에 관한 연구)

  • Kang, Seong Kyung;Lee, Young Jai
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.798-809
    • /
    • 2020
  • Evidence-based policymaking and assessments for scientific administration have increased the importance of statistics (data) utilization. Statistics can explain specific phenomena by providing numerical values and are a public resource for national decision making. Due to these inherent attributes, statistics are utilized as baseline and base data for government policy determinations and the analysis of various phenomena. However, compared to the importance, the role of statistics is limited, and statistics are often used as simple abstracts, produced mainly for suppliers, not for consumers' perspectives to create value. This study explores the statistical data and other attributes that can be utilized for policies or research to address the problems mentioned above. The baseline statistical data used in this study is from the Maritime Distress Accident Statistical Yearbook published by the South Korean Coast Guard, and other additional attributes are from text analyses of vessel casualty situation reports from the South Korean Maritime Police. Collecting 56 attributes drawn from the text analysis and executing an EDA resulted in 88 attribute unions: 18 attribute unions had a satisfactory significance probability (p-value < .05) and a strong correlation coefficient above 0.7, and 70 attribute unions had a middle correlation. (over 0.4 and under 0.7). Additionally, to utilize the extra attributes discovered from the EDA politically, a keyword analysis for each detailed strategy of the disaster Preparation basic plan was executed, the utilization availability of the attributes was obtained using a matching process of keywords, and the EDA deducted attributes were examined.