• Title/Summary/Keyword: Cyber-crime

Search Result 119, Processing Time 0.019 seconds

Cyber forensics domain ontology for cyber criminal investigation (사이버 범죄 수사를 위한 사이버 포렌식 범주 온톨로지)

  • Park, Heum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1687-1692
    • /
    • 2009
  • Cyber forensics is used the process and technology of digital forensics as a criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data in cyber space. Accordingly, it is difficult to determine relational crime types, collect evidence and the legal admissibility of evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. In this paper, we constructed a cyber forensics domain ontology for cyber criminal investigation using the concepts, relations and properties, according to categories of cyber crime, laws, evidence, and information of criminals and crime-cases. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

Control of International Cyber Crime

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.137-144
    • /
    • 2016
  • The followings are required to establish uniform principle of criminal jurisdiction for international cyber crime into customary international law; (1) clear guideline of UN for promoting national practice (2) formation of general practices based on these guidelines (3) these general practices should obtain legal confidence. International society is in close cooperation for investigating and controlling cyber threat. The US FBI has closed down the largest online crime space called 'Darkcode' and prosecuted related hackers based on joint investigation with 19 countries including England, Australia, Canada, Bosnia, Croatia, Israel, and Rumania. More and more people in Korea are raising their voices for joining cyber crime treaty, 'Budapest Treaty.' Budapest Treaty is the first international treaty prosecuting cyber crime by setting out detailed regulations on internet criminal act. Member countries have installed hotline for cyber crime and they act together. Except European countries, America, Canada, and Japan have joined the treaty. In case of Korea, from few years before, it is reviewing joining with Ministry of Foreign affairs, Ministry of Justice and the National Police but haven't made any conclusion. Different from offline crime, cyber crime is planned in advance and happens regardless of border. Therefore, international cooperation based on position of punishing criminals and international standards. Joining of Budapest international cyber crime treaty shall be done as soon as possible for enhancing national competence.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.

Countermeasure by Cyber Infringement Accident Present Condition Analysis of Public and Private Section (공공 및 민간부문의 사이버침해사고 현황분석에 따른 대응방안)

  • Cho, Ho-Dae;Shin, Dong-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.331-338
    • /
    • 2009
  • We live was operates the life which is the Internet and became infra is very important. In order minimizes like this disfunction from will be applied the new order must take a position in cyber space. The cyber infringement most the information society brings about is serious concern middle one. The biggest thing is anonymous characteristic with cause of cyber crime. Also well cannot know becomes the cause where commits a crime that about cyber crime. Cyber crime the guilty conscience is thin. And the criminal who commits a cyber crime sense of insecurity is few. This paper which sees cyber infringement accident dividing came in public section, and analyzed presented a present condition and a confrontation plan.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

Analysis on the Relationship between Online Game-Item Trade and Cyber Crimes (온라인 게임 및 아이템 거래의 범죄 연관성에 관한 실증 연구)

  • Choi, Seong-Rak;Kim, Choel-Hoi
    • Journal of Korea Game Society
    • /
    • v.11 no.2
    • /
    • pp.69-79
    • /
    • 2011
  • Online game industry and item trade have grown up fast after 2000. And there has been a perspective that online game and item trade are the cause of the crimes, especially cyber crime like hacking, virus. But there was no positive research about the opinion, so this article studies the relations among online game, item trade and crime. The results suggest that online game and item trade maybe a cause of cyber crime and property crime. But online game and item trade don't increase the total number of crime. That means that online game and item trade substitute the way how crime happens. Online game and item trade substitute no-property crime to property crime.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

A Study on Effective Response of Police Officer against Cybercrime (경찰의 사이버범죄에 대한 효율적 대응방안에 관한 연구)

  • Park, Chang-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • In this modern society, a main tendency of crime is to increase in the incidence frequency of cyber crime. Varied criminal techniques from simple crimes to highly specialized crimes appear through cyber space. With the expansion of Internet spread, ordinary people increasingly have an opportunity to have access to information media and their possibilities to be involuntary associated with crimes get higher. In this sense, its seriousness is great. This study examined the present state of cyber crimes that appear through their several types and characteristics and the problems of police response to cyber crimes, and suggest effective response of police officer.

  • PDF