• Title/Summary/Keyword: Criminal

Search Result 830, Processing Time 0.03 seconds

Past records for the application of arbitrary accomplice regulations to Accomplice-essential crimes

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.149-155
    • /
    • 2022
  • The view of not fully denying the application of accomplice regulations to non-punishable opponents has fallen into a formal and logical circular argument that only provides formal grounds for non-punishment and has failed to provide practical grounds. In addition, it can be said that it has a criminal policy problem contrary to the legal sentiment of the general public by not punishing the active government travel activities of non-punishable accomplices. Therefore, in order to solve this problem, it is necessary to respect the legislator's intention that general non-punishment accomplices can be punished if they exceed the 'minimum government travel commission'. Therefore, if an unpunishable accomplice acts at least within the act required to realize the constituent requirements, the application of the accomplice regulations shall be excluded, and the accomplice regulations shall be applied only if they exceed that extent. In addition, if the indispensable counterparty is a protected person or has no responsibility (possibility of expectation), it can be said that it has provided a practical basis for the inability to punish, so it can be understood as impossible to punish. This interpretation method is thought to be able to present concrete validity in marginal cases where the counterparty is more responsible by substantially presenting the basis for an unpunishable accomplice.

Cold Boot Attack on Encrypted Containers for Forensic Investigations

  • Twum, Frimpong;Lagoh, Emmanuel Mawuli;Missah, Yaw;Ussiph, Najim;Ahene, Emmanuel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3068-3086
    • /
    • 2022
  • Digital Forensics is gaining popularity in adjudication of criminal cases as use of electronic gadgets in committing crime has risen. Traditional approach to collecting digital evidence falls short when the disk is encrypted. Encryption keys are often stored in RAM when computer is running. An approach to acquire forensic data from RAM when the computer is shut down is proposed. The approach requires that the investigator immediately cools the RAM and transplant it into a host computer provisioned with a tool developed based on cold boot concept to acquire the RAM image. Observation of data obtained from the acquired image compared to the data loaded into memory shows the RAM chips exhibit some level of remanence which allows their content to persist after shutdown which is contrary to accepted knowledge that RAM loses its content immediately there is power cut. Results from experimental setups conducted with three different RAM chips labeled System A, B and C showed at a reduced temperature of -25C, the content suffered decay of 2.125% in 240 seconds, 0.975% in 120 seconds and 1.225% in 300 seconds respectively. Whereas at operating temperature of 25℃, there was decay of 82.33% in 60 seconds, 80.31% in 60 seconds and 95.27% in 120 seconds respectively. The content of RAM suffered significant decay within two minutes without power supply at operating temperature while at a reduced temperature less than 5% decay was observed. The findings show data can be recovered for forensic evidence even if the culprit shuts down the computer.

International and National Legal Experience in Combating Corruption and the Influence of Information Policy on Improving the Implementation of Anti-Corruption Measures

  • Bagdasarova, Anaid E.;Dzhafarov, Navai K.;Kosovskaya, Viktoria A.;Muratova, Elena V.;Petrova, Irina A.;Fedulov, Vyacheslav I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.169-174
    • /
    • 2022
  • The purpose of the study is to research the legal nature and essence of corrupt behavior, as well as the international and national legal aspects of the fight against corruption. The article discloses the relation between the factual results of the operation of anti-corruption normative and legal acts and the goals and objectives for which they were adopted. The effectiveness of the regulatory effect and quality of anti-corruption legislation is determined by the example of the Russian Federation. The article provides an analysis of theoretical aspects of the theory and history of the formation and development of anti-corruption legislation (on the example of Russia and some other countries, as well as international legal norms) giving several practical examples from foreign legislation demonstrating the structure of the system of government bodies battling against corrupt behavior (including its latent forms). The authors suggest that there is a need for a unified conception of information and propaganda support of state anti-corruption activities. This will make it possible to inform the population that the state is actively working to prevent corruption threats and to bring perpetrators to justice, as well as contribute to citizens' trust in the state policy in this area. At the same time, it is necessary to regularly inform the citizens about the provisions of the anti-corruption legislation, explaining the importance of their observance.

Characteristics of Impulsive and Premeditated Aggression Subtypes in Patients with Schizophrenia in South Korea Who Committed a Crime (범죄로 수감중인 국내 조현병 환자의 충동적 공격성과 계획적 공격성의 특성 비교)

  • Kim, Minah;Jo, Yongwoo;Lee, Tae Young;Lim, Kyung-Ok;Kwon, Jun Soo
    • Korean Journal of Schizophrenia Research
    • /
    • v.24 no.1
    • /
    • pp.8-16
    • /
    • 2021
  • Objectives: Although the characteristics of different aggression subtypes provide important information in establishing treatment and prevention strategies in schizophrenia patients, limited information is available about the characteristics of the aggressive subtype in schizophrenia patients in South Korea. The present study was designed to compare the demographic and psychological characteristics across the impulsive and premeditated aggression subtypes in schizophrenia patients in South Korea who had committed a crime. Methods: We enrolled 116 schizophrenia spectrum disorder patients who were admitted to the National Forensic Psychiatric Hospital. Using the criminal and interview records, the study subjects were divided into 83 impulsive and 33 premeditated aggression groups. The subjects' demographic and psychological characteristics were summarized and compared across aggression subtypes. Results: Compared to the premeditated aggression group, the impulsive aggression group had a higher intelligent quotient and a lower rate of physical and sexual abuse experience. Conclusion: To our knowledge, this is the first study to describe the characteristics of aggression subtypes in schizophrenia patients in South Korea who had committed a crime. Our results suggest that different treatment and prevention strategies should be considered for each aggression subtype.

Forensic study of autonomous vehicle using blockchain (블록체인을 이용한 자율주행 차량의 포렌식 연구)

  • Jang-Mook, Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.209-214
    • /
    • 2023
  • In the future, as autonomous vehicles become popular at home and abroad, the frequency of accidents involving autonomous vehicles is also expected to increase. In particular, when a fully autonomous vehicle is operated, various criminal/civil problems such as sexual violence, assault, and fraud between passengers may occur as well as the vehicle accident itself. In this case, forensics for accidents involving autonomous vehicles and accidents involving passengers in the vehicles are also about to change. This paper reviewed the types of security threats of autonomous vehicles, methods for maintaining the integrity of evidence data using blockchain technology, and research on digital forensics. Through this, it was possible to describe threats that would occur in autonomous vehicles using blockchain technology and forensic techniques for each type of accident in a scenario-type manner. Through this study, a block that helps forensics of self-driving vehicles before and after accidents by investigating forensic security technology of domestic and foreign websites to respond to vulnerabilities and attacks of autonomous vehicles, and research on block chain security of research institutes and information security companies. A chain method was proposed.

Artificial Intelligence In The Modern Educational Space: Problems And Prospects

  • Iasechko, Svitlana;Pereiaslavska, Svitlana;Smahina, Olha;Lupei, Nitsa;Mamchur, Lyudmyla;Tkachova, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.25-32
    • /
    • 2022
  • The hypothesis of the study of the article is that the use of elements of artificial intelligence will increase the effectiveness of the educational process of the university if: a set of pedagogical conditions for the construction and use of an expert system with elements of artificial intelligence in the educational process of the university is revealed; a model for preparing a future teacher of vocational training for the use of elements of artificial intelligence has been developed; a special course has been developed that contributes to the implementation of the professional orientation of education. In accordance with this, the following tasks were studied in the article: An analysis of scientific and methodological research in the field of the current state, prospects for the development and use of elements of artificial intelligence in the preparation of a future teacher of vocational training and to determine the dynamics of the introduction of intelligent expert systems in education; A set of pedagogical conditions for the construction and use of an expert system with elements of artificial intelligence in the educational process of a university is revealed; It is substantiated to develop a model for preparing a teacher of vocational training to use elements of artificial intelligence.

Classification of DJI Drones Based on Flight Log Decryption Method (비행 로그 복호화 방식에 따른 DJI 드론 분류)

  • Lee, Youngwoo;Kim, Juhwan;Yu, Jihyeon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.77-88
    • /
    • 2022
  • With the development and popularization of drone manufacturing technology, the drone market, which was mainly focused on industry, agriculture, and military, is also showing great growth in individual and commercial markets. Among them, DJI has a high share in the personal and commercial drone market, and accordingly, forensic analysis of DJI drones is drawing attention. In particular, when stealing and analyzing drones used in criminal acts, a technology to interpret flight logs recording drone flight paths and hardware information is needed, which inevitably applies drone models due to differences in decryption methods. Therefore, when an unidentified drone is acquired from the perspective of a digital forensic investigator, a clear classification of a drone model to which analysis can be applied is required. This paper proposes a method of extracting and analyzing artifacts of DJI drones through forensics, and analyzes media data analysis and flight log analysis results and decryption methods for three drone models with different release years of DJI. Finally, drones in the DJI product line are classified according to whether the commercialized DJI drone flight log is decrypted.

Trend Analysis of the Factors of Cyber Crime Offences Among Adolescents (시간의 흐름에 따른 청소년 사이버범죄 가해경험 영향요인의 변화에 대한 연구)

  • Shin, Ji-hui;Hong, Myeong-gi;Hwang, Eui-gab
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.87-95
    • /
    • 2022
  • Cyber society formed by the development of the Internet is growing rapidly. The Internet is very convenient for our daily life, but it comes with negative aspects including cybercrime and cyberbullying. Recently, there have been incidents that show cyber criminal techniques of adolescents are getting more sophisticated and ferocious. To cope with this crime problem, it is necessary to analyze the causes that affect cyber crime offences among adolescents. There are numerous studies on cybercrime, but less attention has been given to trend analysis. To fill this void, this study examined how the factors that affected the cyber crime offences among adolescents have been changed over time according to transitions in social structure. Implications for future research and policies for adolescents' cyber crime prevention such as time considered response strategies are discussed based on the findings.

Digital Prostitution: International Legal Experience of Criminalization and Decriminalization

  • Baranenko, Dmytro;Lashchuk, Nataliya;Vynnyk, Anna;Rodionova, Taisa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.400-405
    • /
    • 2022
  • Legislative approaches to regulating the digital sex industry are increasingly being debated at the international and national levels. There is a trend showing an increased interest in the decriminalization of sex work. At the same time, in many countries, activities related to digital prostitution remain criminalized. In this regard, it is important to analyze the international legal experience of the criminalization and decriminalization of digital prostitution, as well as to pay attention to the key problematic issues that arise during the criminalization and decriminalization of such an issue. The object of the study is the international experience of criminalization and decriminalization of digital prostitution. The subject of the study is social relations that arise, change, and cease during the criminalization and decriminalization of digital prostitution. The research methodology consists of such methods as philosophical, logical, special-legal, system analysis methods, and formal-dogmatic methods. Research results. As a result of the study of the international legal experience of criminalization and decriminalization of digital prostitution, it was concluded that the criminalization and/or decriminalization of digital prostitution is treated differently in different countries. Workers in this industry advocate decriminalization, not legalization, because decriminalization puts power directly in the hands of sex workers and creates no legal barriers. Countries that have decriminalized digital prostitution believe that sex work is real work and should be treated respectfully, and banning resources such as OnlyFans is not in favor of such workers. Regarding positions on the criminalization of prostitution, countries use different models of such criminalization, including the model of legalization of digital prostitution, which, on the one hand, allows prostitution, but establishes criminal liability for deviations from the rules established by the state.

A Study on Policy Support for Emergency Relief Grant for COVID-19 through Causal Loop Analyses (인과지도 분석을 통한 코로나-19의 소상공인 정책지원 연구)

  • Suh, Kyung-Do;Choi, Jung il;Choi, Pan-Am;Jung, Jaerim
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.531-539
    • /
    • 2022
  • The government enforced policies such as social distancing and limiting business hours to prevent the spread of COVID-19. However, the impact of the long-term COVID-19 pandemic is causing more serious difficulties for small business owners. The government intended to relieve the business management pressure for small business owners by drawing up the COVID-19 emergency disaster relief funds. The funds provided temporary support for the small business owners, but the prolonged pandemic worsened the business management difficulties. Therefore, this study will apply fixes that fail and shifting the burden archetypes from the system archetype of system thinking for the exploratory deduction of policy measures as the policy leverage to effectively enhance the recovery of small business owners. In response to the situation, emergency financial aid for small business owners and support that can enhance the self-sustaining powers are required to heighten the recovery of small business owners.