• Title/Summary/Keyword: criminal justice information

Search Result 33, Processing Time 0.021 seconds

AI Crime Prediction Modeling Based on Judgment and the 8 Principles (판결문과 8하원칙에 기반한 인공지능 범죄 예측 모델링)

  • Hye-sung Jung;Eun-bi Cho;Jeong-hyeon Chang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.99-105
    • /
    • 2023
  • In the 4th industrial revolution, the field of criminal justice is paying attention to Legaltech using artificial intelligence to provide efficient legal services. This paper attempted to create a crime prediction model that can apply Recurrent Neural Network(RNN) to increase the potential for using legal technology in the domestic criminal justice field. To this end, the crime process was divided into pre, during, and post stages based on the criminal facts described in the judgment, utilizing crime script analysis techniques. In addition, at each time point, the method and evidence of crime were classified into objects, actions, and environments based on the sentence composition elements and the 8 principles of investigation. The case summary analysis framework derived from this study can contribute to establishing situational crime prevention strategies because it is easy to identify typical patterns of specific crime methods. Furthermore, the results of this study can be used as a useful reference for research on generating crime situation prediction data based on RNN models in future follow-up studies.

A Preliminary Study of the Validity of the Concealed Information Test Using P300 and Reaction Time (P300과 반응시간을 이용한 거짓반응의 타당성에 대한 예비적 연구)

  • Park, Gun-Tae;Rhee, Moon-Sung;Kim, Moo-Jin;Roh, In-Soo;Jeong, Phil-Ja
    • Anxiety and mood
    • /
    • v.4 no.2
    • /
    • pp.99-103
    • /
    • 2008
  • Objectives : The authors sought to examine the differences in the number of P300 detected by subjects in experimental and control groups when exposed to relevant stimuli. In addition, the authors tried to determinethe subjects' reaction time when asked to respond to relevant stimuli. Methods : The subjects were 20 informed female volunteers aged 22-38 years (median age : 24). Relevant stimuli (concealed information) were created by unknowingly exposing the two groups to obscene pictures and semantic questions. The number of P300 detected and the length of reaction time were compared between the two groups. Results : Contrary to theauthors' expectations, there were no significant differences in the number of P300 detected or in the length of reaction time between the two groups. Conclusions : These results indicate that, unlike a polygraph test, concealed information tests adopting P300 and reaction time as major physiological responses ofsubjects exposed to meaningful personal information might not serve as a valid practical tool in the field of criminal psychology. However, further studies involving a greater number of subjects are needed before a final conclusion regarding the validity of this new type of concealed information test can be drawn.

  • PDF

A Study on Efficient Utilization Plan of Interpol to Combat Supranational Crimes (초국가적 범죄의 대응강화를 위한 인터폴의 효율적 활용방안에 관한 연구)

  • Oh, Seiyouen;Song, Hyejin
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.559-565
    • /
    • 2014
  • This study provides the basic data for using the connections of Interpol to combat supranational crimes, reflecting domestic and foreign situations, and I'll summarize the countermeasures as follows through the results of this study. First of all, it is necessary to build up the international cooperative system which shares information and technology between nations, through the network formation of Asianpol. Second, a policy of Interpol which maximizes the foreign agents and resident officers in Korea needs to be established. Third, governmental policies and legal measures such as criminal extradition must be available to help the criminal investigations of Interpol quickly and positively. Fourth, there has to be the expansion of budget for securing professional investigators and supporting Interpol to fight supranational crimes by the authority of the government.

A Study on Violence and Countermeasures on Cyberspace Corruption (부패범죄의 현황과 대책연구:사이버폭력을 중심으로)

  • Kim, Taek
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.51-58
    • /
    • 2019
  • This study focused on violent act, such as verbal offensive and other acts of violence such as cyber bullying, personal information infringement. Online bullying is seriously taking place online, as juvenile violence is seriously debated due to recent school violence. In particular, it is necessary to seek countermeasures by considering the nature of cyber violence in cyberspace, particularly when stalking victims in cyberspace have died from stalking. The study examines the problem of defamation and defamation of character and tries to identify problems. Measures were taken to enact cyber defamation laws. To this end, the Commission analyzed cases of defamation and defamation of character and considered legal precedents. The study intends to study cyber defamation and defamation of character. First, I want to differentiate between cyber libel and defamation of character. Second, I intend to raise the need for cyber defamation of cybercrime and consider the offence of contempt for the criminal justice system. Third, seek ways to protect against cyber defamation and defamation of character.

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence

  • Arshad, Humaira;Jantan, Aman Bin;Abiodun, Oludare Isaac
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.346-376
    • /
    • 2018
  • Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, although, on occasions are justifiable. Presently, the use of scientifically unproven forensic techniques are highly criticized in legal proceedings. Nevertheless, the exceedingly distinct and dynamic characteristics of electronic data, in addition to the current legislation and privacy laws remain as challenging aspects for systematically attesting evidence in a court of law. This article presents a comprehensive study to examine the issues that are considered essential to discuss and resolve, for the proper acceptance of evidence based on scientific grounds. Moreover, the article explains the state of forensics in emerging sub-fields of digital technology such as, cloud computing, social media, and the Internet of Things (IoT), and reviewing the challenges which may complicate the process of systematic validation of electronic evidence. The study further explores various solutions previously proposed, by researchers and academics, regarding their appropriateness based on their experimental evaluation. Additionally, this article suggests open research areas, highlighting many of the issues and problems associated with the empirical evaluation of these solutions for immediate attention by researchers and practitioners. Notably, academics must react to these challenges with appropriate emphasis on methodical verification. Therefore, for this purpose, the issues in the experiential validation of practices currently available are reviewed in this study. The review also discusses the struggle involved in demonstrating the reliability and validity of these approaches with contemporary evaluation methods. Furthermore, the development of best practices, reliable tools and the formulation of formal testing methods for digital forensic techniques are highlighted which could be extremely useful and of immense value to improve the trustworthiness of electronic evidence in legal proceedings.

A study on the Necessity of the Death Penalty in the Information Society -Focused on the misjudgement cases- (정보화 사회에 있어서 사형제도 폐지의 당위성 -오판사례를 중심으로-)

  • Lee, Dong-Myung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.151-159
    • /
    • 2014
  • Sometimes, the misjudgement of imperfect human can not be avoided because capital punishment is decided by a judicial officer, human. Dreiinstanzen system has been adopted to prevent misjudgement. However the possibility of misjudgement can not be entirely excluded in the judgement by a judicial officer as the judgement of a lower court and a higher tribunal depends on the specific criminal cases. And in case of capital punishment executed by misjudgement, it leads to a cruelty result which has not ways to recover the damage. There is an opinion that dangerousness of misjudgement is lacking in persuasiveness because of insufficient demonstration for the abolition of capital punishment. However, also, there is an opinion that the abolition of capital punishment in case of misjudgement is persuasive with reality. In this case, even if other punishments are discussed separately, once capital punishment is executed, it can be irrevocable unjustice because a nation itself commits a crime. According to this, I would like to find out causes of misjudgement in the criminal justice system through the cases of advanced countries, such as United states, Japan, which are rich in studies and case analysis related to misjudgement, and introduce their efforts to prevent misjudgement in this paper.

The problem point and improvement program of the scene search and seizure of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2595-2601
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.

A Deep Learning Approach for Identifying User Interest from Targeted Advertising

  • Kim, Wonkyung;Lee, Kukheon;Lee, Sangjin;Jeong, Doowon
    • Journal of Information Processing Systems
    • /
    • v.18 no.2
    • /
    • pp.245-257
    • /
    • 2022
  • In the Internet of Things (IoT) era, the types of devices used by one user are becoming more diverse and the number of devices is also increasing. However, a forensic investigator is restricted to exploit or collect all the user's devices; there are legal issues (e.g., privacy, jurisdiction) and technical issues (e.g., computing resources, the increase in storage capacity). Therefore, in the digital forensics field, it has been a challenge to acquire information that remains on the devices that could not be collected, by analyzing the seized devices. In this study, we focus on the fact that multiple devices share data through account synchronization of the online platform. We propose a novel way of identifying the user's interest through analyzing the remnants of targeted advertising which is provided based on the visited websites or search terms of logged-in users. We introduce a detailed methodology to pick out the targeted advertising from cache data and infer the user's interest using deep learning. In this process, an improved learning model considering the unique characteristics of advertisement is implemented. The experimental result demonstrates that the proposed method can effectively identify the user interest even though only one device is examined.

An exploration of factors affecting the Crime-Terror Nexus (테러집단의 범죄 집단과의 결합현상(Crime-Terror Nexus)에 영향을 미치는 요인들에 대한 탐색적 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.83-108
    • /
    • 2013
  • Since the end of the Cold War and rapid globalization and technical developments, terrorist groups actively involved in criminal activities. Also criminal entrepreneurs became a major financial revenue for these terrorists groups. This newly patternized activities among terrorist groups is now called as Crime-Terror Nexus" indicating the changing nature of terrorism, which means two traditionally separate phenomena, crime and terrorism, became more similar. This new pattern of terrorism is considered to create synergy for the criminal organizations and terrorist groups, scholars believe that it would become a significant threat to the security of world community in the near future. Although the phenomenon of this crime-terror nexus is significant and imminent threats, there is lack of studies investigation this new evolution of terrorism with empirical data. Moreover there is literally no studies exploring factors relevant to the Crime-Terror Nexus. Therefore, this current study aims to conduct explorative investigation of factors affecting the "Crime-Terror Nexus" with a world terrorism data, MAROB(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new terrorism patterns and the challenging nature of conducting empirical studies on this topic, this study has great contribution on the development in the field of criminal justice as well as terrorism.

  • PDF

The problem point and improvement program of the scene confiscation search of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.118-122
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.his is an example of ABSTRACT format.

  • PDF