• Title/Summary/Keyword: Cyber Law

Search Result 119, Processing Time 0.028 seconds

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

Trends on U.S. Cyber Security Event Notifications and its Implications

  • Byun, Ye-Eun;Shin, Ick-Hyun;Kwon, Kook-Heui;Kim, Sang-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.449-451
    • /
    • 2015
  • When cyber attacks are discovered in nuclear facilities, licensees are required to notify regulatory organizations for quick action. This also helps regulatory organizations to strengthen regulatory capabilities for cyber security. Currently the U.S. issued the final draft rule for Cyber Security Event Notifications. Domestic regulatory activities being at an early stage for cyber security need to implement law for Cyber Security Event Notifications. Since the current laws are focused on the aspect of safety, they are in need of more specific laws for cyber security.

Mobile Auto questions and scoring system (국가 사이버안보 시스템 관련 법률안 분석과 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.363-365
    • /
    • 2014
  • Internet baking, e-commerce, business processing, etc on smartphone handing could be possible in present days. Ambiguity between cyber and real life has made vulnerability on infrastructure, Gov't Service and National security by cyber terrorism. Especially, Lots of Infrastructure and Gov't Service based on Information Technology were exposed by Cyber terror. Legal system should be improved to keep from these threats. This paper proposed needs of cyber legal system by analyzing proposed cyber related code on Korean National Assembly, issue on Cyber Control Tower, National Cyber Security Industry and Human resource.

  • PDF

Reexamination of the Cyber Insult Crime For securing the Internet Ethics (인터넷윤리 확보를 위한 사이버모욕죄의 재검토)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.111-120
    • /
    • 2013
  • Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.

The application of digital forensic investigation for response of cyber-crimes (사이버범죄의 대응강화를 위한 디지털 포렌식 수사 활용방안)

  • Oh, Sei-Youen
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • This study will show the digital forensic model which fights against cyber-crimes to prepare various cyber-crimes. The digital forensic model will be more useful about the investigation of cyber-crimes and arresting criminals after researching the uses of the digital forensic model and cyber-crime rates in South Korea. This model conduct the standardized data with various languages by the language support system through the digital forensic analyzer. This model will send the data to law enforcement reviewing whether or not we ought to prove criminal charges. Moreover, law enforcement can access the file system to find out admissibility of evidence. And this model simplifies lawful investigation about additional investigation. The data, which is conducted and saved by the digital forensic system, will be helpful to protect against the future crimes because of the data.

Status and Measures for Cyber Sexual Violence (사이버 성폭력에 대한 실태와 대책방안)

  • Park, Cho-A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.191-193
    • /
    • 2012
  • 인터넷과 기타 휴대용 PC등이 발전하고 보편화됨에 따라 인터넷 이용이 편리해짐은 좋지만 비대면성, 비익명성, 비 국경성 등 인터넷의 이러한 특성상 사이버 범죄들이 나날이 다양해지고 증가하고 있는 추세이다. 특히 사이버 범죄 중에서도 스토킹, 원조교제의 수단, 몰래카메라, 사이버음란물 유통 등 각종 신종 성폭력이 심각해지고 있어 사회문제로 끈임 없이 등장하고 있다. 현실세계에서의 성폭력과 마찬가지로 피해자가 느끼는 성적 수치심이나 심적 고통은 피해자의 자아에 깊은 상처를 남기며 더 나아가 왜곡된 성문화를 정착 시키는 새로운 사회적 문제로 작용한다는 점에서 사이버성폭력의 심각성과 문제는 오프라인상의 성폭력범죄에 비해 결코 뒤지지 않을 것이다. 물론 이러한 범죄들에 대한 처벌 조항들은 있다. 그러나 이런 것들이 있음에도 사이버상의 성폭력은 근절되지 않고 있다. 이것은 법적인 조치의 강화를 요구하는 동시에 인터넷을 사용하는 네티즌 스스로의 적극적 대처를 요구하는 것이기도 하다.

  • PDF

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Joharry, Siti Aeisha;Turiman, Syamimi;Nor, Nor Fariza Mohd
    • Asia Pacific Journal of Corpus Research
    • /
    • v.3 no.2
    • /
    • pp.17-33
    • /
    • 2022
  • While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.

A Study on Improving Support for Victims of Cyber-Violence (사이버 폭력의 피해자 지원에 대한 개선방안)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.227-233
    • /
    • 2012
  • Recently, violence in cyberspace has been increasing and it causes not only severe emotional distress to the victims but also hampers a healthy cyber culture. This paper aims to find out about characteristics and the actual state of Cyber-Violence, and Evaluate the measures concerning it. Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation, cyber-stalking, circulation of cyber-pornography, and that is the reality there are lack of practical measures. As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal penalties. As a more fundamental measure, a greater effort of netizen's self-purification and systematic training and promotion for the prevention of damage is necessary.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.