• Title/Summary/Keyword: Crime Investigation

Search Result 207, Processing Time 0.023 seconds

Simulation Analysis of Network Load of Application Level Security Protocol for Smart grid (시뮬레이션을 이용한 스마트 그리드 통신망 상의 응용 계층 보안 프로토콜의 부하 분석)

  • Lee, Kwang-Sik;Han, Seung-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.17-24
    • /
    • 2015
  • Smart grid is a modernized electrical grid that uses information and communication technologies to gather and act on information, such as information about the behaviors of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. However, with the advent of cyber crime, there are also concerns on the security of the infrastructure, primarily that involving communications technologies. In this work, we make an in-depth investigation on the issue of security services and network loads on Smart grid. Through simulation, we analyze the relations between security services and network loads. The experimental results of this study will contribute toward designing an advanced Smart grid system that offers better quality of services. Also, the approach proposed in this study can be utilized to derive new and valuable insights in security aspects.

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Study on the Profiling System in the Aviation Security (항공보안에서의 프로파일링 연구)

  • Hwang, Ho-Won;Lee, Kyu-Hang
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.155-175
    • /
    • 2007
  • As intellectual terror threats increase, we feel the limit in coping with those threats and the things we do are placing traditional X-ray machines & ETD and increasing aviation security staffs. In fact, even if air transportation system is the fast and most efficient transportation methods, it is true that there are many inconveniences to endure due to terror threats. In the name of security, even if we make a lot of efforts and time to screen both good-natured passengers, baggage, cargo and suspicious passengers, it is impossible to screen perfectly and it is not an efficient methods. Therefore, we introduce profiling system that reduce the effort to screen good-natured passengers but focus on screening dangerous passengers and baggages. Profiling system strengthens aviation security, using the concept "Selection & Concentration". Israel started to introduce manual profiling system in aviation security, which is interviewing suspicious passengers and it has been used in crime investigation since 1960. And it has been upgraded and diversified to CAPPS(Computer Assisted Passenger Screening Program) and SPOT(Screening Passenger by Observation). So, this theses is to study on the concept & kind of profiling and profiling methods adopted in airlines. Also it presents the method of introduction of profiling system in Korea and the necessity of making law on it.

  • PDF

Implementation of Image-based Virtual Fence for Surveillance Area Setup (감시영역 설정을 위한 영상 기반 가상펜스 구현)

  • Kim, Jae-jun;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2145-2152
    • /
    • 2015
  • The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.

A Study on the Ornamental Representation in Contemporary Commercial Space (현대 상업공간 실내디자인에 나타나는 오나먼트의 표상성에 관한 연구)

  • Han, Hea-Shin;Kim, Moon-Duck
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.6
    • /
    • pp.133-141
    • /
    • 2009
  • Since Adolf Loos' Ornament and Crime was released, ornament had been regarded as a vice in Modern architecture. In Post Modern architecture, the ornamental vocabularies extracted from the classical architecture have been symbolically expressed. As a result, the significance of existence of and the use value of architecture have increased with improved intimacy to the public. However, many studies that have analyzed architecture in terms of semantics and semiotics focusing on communication between architecture and the public have admitted instability in architectural meaning because of the fundamental difference between architecture and language. At the same time, the architectural representation has encountered a lot of limitations along with the deconstruction and non-presentation theory in Post-Structuralism. Even under these circumstances, the ornamental representation can be a critical factor which makes communication possible while expressing spatial identity in this pluralistic contemporary society. Hence, this paper has established logical grounds for research based on theoretical investigation on the concept of representation, semiotics, and ornamental representation, with regard to spatial communication through ornamental representation in commercial space. Based on Peirce's Semiotics which is the typical theoretical science in terms of representation, this paper has analyzed the three kinds of signs (Icon, Index and Symbol) that he proposed. Peirce's classification of signs becomes ideal when the factors are well balanced, with room for combination instead of strict classification. It appears that his theory of signs would be useful in understanding and analyzing ornamental representation. This study on representational ornament could offer a plan for ideal communication and abundant spatial experience in the interior design of commercial space in which the expression of creative space identity is required.

The three most significant contributions of criminological theories to our theoretical understanding of criminal behavior made since 1985 (범죄학 이론의 발전에 영향을 미친 이론들에 대한 고찰: -1985년 이후의 중요한 범죄이론을 중심으로-)

  • Jang, Duck-Hyung
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.449-468
    • /
    • 2015
  • It is important to identify and discuss what the most vial contributions of criminological theories. In the field of criminology, most significant contributions or advancement have been made on the various issues such as age, the integration of structural and procedural level theories, other theoretical integration debates. However, it is hard to find ant systematic study exploring such a contribution in criminological theories. This study, therefore, has a purpose to discuss three most significant contributions to our theoretical understanding of criminal behavior made since 1985. To accomplish the study purpose, this study choose the followed three theoretical contributions; the emergence of life course theory, the revision of social disorganization theory, and the introduction of social structure and social Learning (SSSL) model. The three theoretical works will be introduced and discussed regarding other theoretical integration trends in the body of this study. The conclusion, contribution of this current study has been discussed in the last conclusion and discussion section.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.

Public Perception of a Criminal DNA Database in Korea

  • Lee, Ji Hyun;Cho, Sohee;Kim, Moon Young;Lee, Seung Hwan;Lee, Hwan Young;Lee, Soong Deok;LoCascio, Sarah Prusoff;Jung, Kyu Won
    • Asian Journal for Public Opinion Research
    • /
    • v.7 no.2
    • /
    • pp.75-93
    • /
    • 2019
  • Background: Since 2010, Korea has maintained a DNA database of those convicted of or awaiting trial for certain crimes. There have been proposals to expand the list of crimes included in this database, or conversely, omit certain crimes if they are committed during protests. An understanding of the feelings of the public as we consider the ethical, legal, and social aspects of a DNA database and as revisions to laws are made is required. Methodology: Questions related to the DNA database were included in the nationally representative Korean Academic Multimode Open Survey (KAMOS) panel (June-August 2016). Results: Of 2,000 randomly selected panel members, 1,013 respondents participated in this survey, including 89.2% who supported the existence of a criminal DNA database. The current system of storing DNA profiles until a suspect's acquittal or a convict's death was supported by 79.5% of respondents. In addition, 70.8% of respondents agreed with the expansion of crime categories included in the criminal database. Many (93.4%) respondents favored genetic testing and data storage to determine the identity and cause of death for people who die of unnatural causes. Some differences in attitude related to social class were noted, with those who self-identified as members of the upper class more likely to support the database and its expansion to include additional crimes than those who self-identified as middle or lower class. Conclusion: Our findings suggest that Koreans generally support the criminal DNA database.