• Title/Summary/Keyword: Digital Collection

Search Result 676, Processing Time 0.022 seconds

A Study on Digital Evidence Collection System in Cyberspace (사이버 공간 내 디지털 증거 수집 시스템에 관한 연구)

  • Jeong, Hyojeong;Choi, Jong-hyun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.869-878
    • /
    • 2018
  • Digital Evidence Data in cyberspace is easy to modify or delete, and changes are reflected in real time, so it is necessary to acquire evidence data quickly. Collecting evidence on the client side is advantageous in that data can be acquired without time delay due to additional administrative procedures, but collection of large data is likewise vulnerable to collection time delay problem. Therefore, this paper proposes an automated evidence collection method on the client side, focusing on the major web-based services in cyberspace, and enables efficient evidence collection for large volumes of data. Furthermore, we propose a digital evidence collection system in cyberspace that guarantees the integrity of the collected digital evidence until the court submission.

A Trend Study on the Digital Collection Development Policy through Case Comparison (국내외 사례비교를 통한 디지털장서 개발정책 동향 연구)

  • Lee, Seon-Hee;Yoo, Su-Hyeon
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.4
    • /
    • pp.125-147
    • /
    • 2008
  • Due to the rapid changes of information environment, the libraries are needed to consider not only analog resources but also digital resources for collection development policy to fit the digital age. However, the libraries have difficulties to build digital collection development policy for collecting and archiving the digital resources because different from the analog resources, characteristics of digital information resources are not contained in physical medium and not allowed ownership but remote access by licensing. Especially, national libraries that have the mission to collect, preserve and transmit knowledge and cultural heritage to the next generation face even more serious challenges. This study intends to figure out the core elements of digital collection development policy through comparison of domestic and overseas national library policies tried to overcome the difficulties.

  • PDF

The Device Allocation Method for Energy Efficiency in Advanced Metering Infrastructures (첨단 검침 인프라에서 에너지 효율을 위한 기기 할당 방안)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.33-39
    • /
    • 2020
  • A smart grid is a next-generation power grid that can improve energy efficiency by applying information and communication technology to the general power grid. The smart grid makes it possible to exchange information about electricity production and consumption between electricity providers and consumers in real-time. Advanced metering infrastructure (AMI) is the core technology of the smart grid. The AMI provides two-way communication by installing a modem in an existing digital meter and typically include smart meters, data collection units, and meter data management systems. Because the AMI requires data collection units to control multiple smart meters, it is essential to ensure network availability under heavy network loads. If the load on the work done by the data collection unit is high, it is necessary to allocation new data collection units to ensure availability and improve energy efficiency. In this paper, we discuss the allocation scheme of data collection units for the energy efficiency of the AMI.

A Study of Information Collection for Computer Forensics on Digital Contents Computing Environment (디지털 콘텐츠 컴퓨팅 환경에서의 컴퓨터 포렌식스 정보 수집에 관한 연구 기술에 관한 연구)

  • Lee, Jong-Sup;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.507-513
    • /
    • 2008
  • In Digital Contents Computing Environment, information such as register, cache memory, and network information are hard to make certain of a real-time collection because such information collection are easily modified or disappeared. Thus, a collection of information is one of important step for computer forensics system on Digital Contents computing. In this paper, we propose information collection module, which collects variable information of server system based on memory mapping in real-time.

  • PDF

A Study on the Cloud Collection (클라우드 컬렉션에 관한 연구)

  • Cho, Jane
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.201-219
    • /
    • 2012
  • Cloud collection, which is derived from cloud computing, is a framework that creates new value through library cooperative platform to preserve and manage libraries' duplicated collection. Due to E-book market vitalization and mass digitalization of retrospective print material, new library collection management paradigm has been expected that licensed based E-book service and management of shared print repository. This study discuss cloud collection concept which digital repository and Shared print repository are in complementary relations. And suggest cloud collection model can be applicable to Korean university libraries.

Digital Library in the Notion of Publishing, II : Practical Design of the Hybrid Digital Library (출판기능이 부여된 디지털도서관 II - 하이브리드 디지털도서관의 모형 설계 -)

  • Chung, Jun Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.109-128
    • /
    • 2014
  • A digital library could be understood as not a part of information cycling, but whole process of information production, circulation and reproduction. This study suggests that a digital library should be a creator as which it is publishing, circulating, and re-producing the information resources. Therefore, the role of intrinsic DRM (Digital Resources Management) can be interpreted as a digital library. Open access model have been already adopted to many university libraries, many university libraries are publishing free access online research resources by themselves. Also, research collection based on cloud computing can be extended to networked research collection and share with other university libraries. These evidences show future library can be the digital library with online and open accessible publishing function.

A Study on Collection Information for Discovery of Distributed Resources in Digital Libraries (디지털도서관에서 분산자원 검색을 위한 장서 정보에 관한 연구)

  • Lee Sung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.2
    • /
    • pp.185-209
    • /
    • 2005
  • The description of resources at collection-level is being recognised as an important component of information services that seek to provide integrated access to distributed resources. This research investigated the concept, necessities, and standards of collection level description which manages heterogeneous and distributed resources effectively. Also this research reviewed collection level description projects in other countries to show a new direction of subject access in digital libraries.

A Balance of Primary and Secondary Values: Exploring a Digital Legacy

  • Cushing, Amber L.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.2
    • /
    • pp.67-94
    • /
    • 2013
  • This exploratory research explores the concept of a digital legacy as a general concept and as a collection of digital possessions with unique characteristics. The results reported in this article are part of a larger study. In Cushing (2013), the author identified the characteristics of a digital possession. In this study, these characteristics of a digital possession were utilized to explore how the characteristics of several digital possessions could form a collection, or a digital legacy. In addition to being explored as a collection of digital possessions, data was collected about the general concept of a digital legacy. In part I of the study, 23 participants from three age groups were interviewed about their general concept of a digital legacy. Five general characteristics describing a digital legacy were identified. In part II of the study, interview data from Cushing (2013) was used to create statements describing digital possessions. The statements were classified utilizing the archival concept of primary and secondary values, as well as the consumer behavior concepts of self extension to possessions and possession attachment. Primary value refers to the purpose for which the item was created, while secondary value refers to an additional value that the participants can perceive the item to hold, such as a perception that an item can represent one's identity. Using standard Q method procedure, 48 participants were directed to rank their agreement with 60 statements (written on cards), along a distribution of -5 to +5, according to the characteristics of the digital possession they would most like to maintain for a digital legacy. The ranked statements were analyzed using Q factor analysis, in order to perceive the most common statements associated with maintaining digital possessions for a digital legacy. Q method results suggested that most individuals described the digital possessions they wanted to maintain for a digital legacy using various combinations of characteristics associated with primary and secondary values. This suggests that while some participants will respond to personal archiving based on the concept of preserving identity (a perceived secondary value), this will not appeal to everyone. Information professional could consider this difference in appeal when marketing personal archiving assistance to patrons.

Digital Evidence Collection Procedure for Hardware Unique Information Collection (하드웨어 고유 정보 수집에 대한 디지털 증거 수집 절차)

  • Pak, Chan-ung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.839-845
    • /
    • 2018
  • Sensitive data is encrypted and stored as privacy policy is strengthened through frequent leakage of personal information. For this reason, the cryptographically owned encrypted data is a very important analysis from the viewpoint of digital forensics. Until now, the digital evidence collection procedure only considers imaging, so hardware specific information is not collected. If the encryption key is generated by information that is not left in the disk image, the encrypted data can not be decrypted. Recently, an application for performing encryption using hardware specific information has appeared. Therefore, in this paper, hardware specific information which does not remain in file form in auxiliary storage device is studied, and hardware specific information collection method is introduced.

A Study on the Design and Implementation of an Digital Evidence Collection Application on Windows based computer (윈도우 환경에서의 증거 수집 시스템 설계 및 구현에 관한 연구)

  • Lee, SeungWon;Roh, YoungSup;Han, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.57-67
    • /
    • 2013
  • Lately, intrusive incidents (including system hacking, viruses, worms, homepage alterations, and data leaks) have not involved the distribution of an virus or worm, but have been designed to acquire private information or trade secrets. Because an attacker uses advanced intelligence and attack techniques that conceal and alter data in a computer, the collector cannot trace the digital evidence of the attack. In an initial incident response first responser deals with the suspect or crime scene data that needs investigative leads quickly, in accordance with forensic process methodology that provides the identification of digital evidence in a systematic approach. In order to an effective initial response to first responders, this paper analyzes the collection data such as user usage profiles, chronology timeline, and internet data according to CFFPM(computer forensics field triage process model), proceeds to design, and implements a collection application to deploy the client/server architecture on the Windows based computer.