• Title/Summary/Keyword: forensic analysis

Search Result 529, Processing Time 0.022 seconds

Perception of Mental Health Recovery of Mentally Disordered Offenders Hospitalized at the National Forensic Psychiatric Hospital : Contents Analysis (국립법무병원에 입원 중인 정신장애 범죄자의 정신 건강 회복에 대한 인식: 내용 분석)

  • Moonhee Gang;Donghyeon Gwak
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.83-97
    • /
    • 2023
  • The purpose of this study was to identify perception of mental health recovery of mentally disordered offenders hospitalized at the national forensic psychiatric hospital. The participants were 91 mentally disordered offenders hospitalized at the national forensic psychiatric hospital in C province. The participants were provided with a written questionnaire about mental health recovery so that they could freely describe it, and collected data were analyzed by two researchers according to Krippendorff's content analysis method. As a result, meaning of mental health recovery were derived from 4 categories and 17 themes, and four categories were 'liberate from psychiatric symptoms', 'stable daily and social life is possible', 'living a hopeful and meaningful life' and 'life without crime after discharge'. mental health recovery facilitators and barriers were derived from 4 categories and 14 themes, 'treatment factors', 'personal factors', 'interpersonal factors' and 'environmental factors'. The results of this study can be used as basic data for education and intervention development for mental health recovery of mentally disordered offenders at the national forensic psychiatric hospital.

Optimization of forensic identification through 3-dimensional imaging analysis of labial tooth surface using open-source software

  • Arofi Kurniawan;Aspalilah Alias;Mohd Yusmiaidil Putera Mohd Yusof;Anand Marya
    • Imaging Science in Dentistry
    • /
    • v.54 no.1
    • /
    • pp.63-69
    • /
    • 2024
  • Purpose: The objective of this study was to determine the minimum number of teeth in the anterior dental arch that would yield accurate results for individual identification in forensic contexts. Materials and Methods: The study involved the analysis of 28 sets of 3-dimensional (3D) point cloud data, focused on the labial surface of the anterior teeth. These datasets were superimposed within each group in both genuine and imposter pairs. Group A incorporated data from the right to the left central incisor, group B from the right to the left lateral incisor, and group C from the right to the left canine. A comprehensive analysis was conducted, including the evaluation of root mean square error (RMSE) values and the distances resulting from the superimposition of dental arch segments. All analyses were conducted using CloudCompare version 2.12.4 (Telecom ParisTech and R&D, Kyiv, Ukraine). Results: The distances between genuine pairs in groups A, B, and C displayed an average range of 0.153 to 0.184mm. In contrast, distances for imposter pairs ranged from 0.338 to 0.522 mm. RMSE values for genuine pairs showed an average range of 0.166 to 0.177, whereas those for imposter pairs ranged from 0.424 to 0.638. A statistically significant difference was observed between the distances of genuine and imposter pairs(P<0.05). Conclusion: The exceptional performance observed for the labial surfaces of anterior teeth underscores their potential as a dependable criterion for accurate 3D dental identification. This was achieved by assessing a minimum of 4 teeth.

Methodology for digital investigation of illegal sharing using BitTorrent (BitTorrent를 이용한 저작물 불법 공유 조사 방법에 관한 연구)

  • Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2013
  • Sharing copyrighted files without copyright holder's permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.

A Study on Casino Embezzlement Incident Analysis and Forensic Investigation Technology (카지노 횡령사건 분석과 포렌식 수사기술 연구)

  • Lee, Gyu-An;Park, Dae-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.105-110
    • /
    • 2011
  • Embezzlement incident of staff at the casino occurred. Staff of some casinos have lower job satisfaction, moral gap is seriously considering a change jobs. In addition, cash lure of large amounts and a lack of money management system causes embezzlement incident. In this paper, the uniqueness of the casino industry and that employee job satisfaction is investigated. Content analysis of occurrence for casino embezzlement incident and tracking that bank account and bank check, suspect's call list, and so on that digital forensic investigation technology will be studied. Problems and solutions suggest that conducted a loss prevention program, a digital forensics technology and introduce of investigator. Through this study, the computerization of the casino business to embezzlement accident prevent will contribute to that give back profits of property to society, the develop of forensic investigation technology.

Analysis of Electric Shock Accident on 4.16 kV Class Circuit breaker for Power Plant (발전소용 4.16 kV급 차단기에서 감전사고 사례 분석)

  • Park, Nam-Kyu;Song, Jae-Yong;Kim, Jin-Pyo;Goh, Jae-Mo
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.4
    • /
    • pp.54-60
    • /
    • 2014
  • This paper describes electric shock accidents on a 4.16 kV class circuit breaker for power plant. Electric shock accidents mostly involve damage of human life, in comparison with electrical fire, rate of human death tend to be higher in electric shock accidents. Specially, in a high voltage facilities rate of human death comprised about 43.7% by electric shock accidents. If electric shock accidents happen in a 4.16 kV class circuit breaker for power plant, then the power plant discontinue power production. Electric shock accidents in a power plant have a great ripple effect such as an electric power shortage. In this paper, we analyzed electric shock accidents on a 4.16 kV class circuit breaker for power plant. From the analysis results, we confirmed a cause of electric shock accidents on a 4.16 kV class circuit breaker, it happened by defect of interlock equipment or occurrence of breakdown between first feeder contactor and shielding plate. In order to reduce electric shock accidents on a 4.16 kV class circuit breaker, the power plant should consider improvement of interlock equipment and insulation of feeder contactor in circuit breaker.

The Windows Physical Memory Dump Explorer for Live Forensics (라이브 포렌식을 위한 윈도우즈 물리 메모리 분석 도구)

  • Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.71-82
    • /
    • 2011
  • Live data in physical memory can be acquired by live forensics but not by harddisk file-system analysis. Therefore, in case of forensic investigation, live forensics is widely used these days. But, existing live forensic methods, that use command line tools in live system, have many weaknesses; for instance, it is not easy to re-analyze and results can be modified by malicious code. For these reasons, in this paper we explain the Windows kernel architecture and how to analyze physical memory dump files to complement weaknesses of traditional live forensics. And then, we design and implement the Physical Memory Dump Explorer, and prove the effectiveness of our tool through test results.

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

Analysis on the Fire Accident of Vehicle Due to Damage of the Vehicle's Electrical Components (차량 전장부품 손상으로 인한 차량화재 사고사례 분석)

  • Park, Nam-Kyu;Kim, Jin-Pyo;Nam, Jung-Woo;Sa, Seung-Hun;Song, Jae-Yong
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.4
    • /
    • pp.32-38
    • /
    • 2015
  • In this paper, we analyzed the vehicle fire accidents due to damage of vehicle's electrical components, which is applied to a vehicle. In recent development of electrical components technology, approximately 40% of vehicle manufacturing parts have applied electronic circuit technology. Phenomenon such deterioration of insulating performance or electric breakdown on the vehicle's electrical components and printed circuit boards(PCBs) resulted from moisture, contamination and aging due to repetitive operations, lead to the vehicle fire. Therefore, the application of electrical components with adequate electric capacity for vehicle and usage of molding techniques using a non-combustible materials to shut off the oxygen should be applied in order to prevent vehicle fire due to damage of the electrical components and PCBs.

The Acquisition Methodology Study of User Trace Data in Mac OS X (Mac OS X 운영체제상의 사용자 흔적정보 수집방안 연구)

  • Choi, Joon-Ho;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.335-346
    • /
    • 2010
  • Mac OS X is the Computer Operating System that develop in Apple Inc. Mac OS X is the successor to Mac OS 9 Version which had been Apple's primary operating system since 1984. Recently, Mac OS X 10.6 (Snow Leopard) has been manufactured and is distributed to user. Apple's Mac OS X Operating System is occupying about 10% in the world Operating System market share. But, Forensic tools that is utilized on digital forensic investigation can not forensic analysis about Mac OS X properly. To do forensic investigation about Mac OS X, information connected with user's action and trace can become important digital evidence in Operating System. This paper presents way about user trace data acquisition methodology in Mac OS X.

Analysis on the Fire Accident of Vehicle Due to Damage of Connector and wiring on an Anti-lock Brake System(ABS) Module (ABS 모듈의 접속부 및 전원배선 손상으로 인한 차량화재 사고사례 분석)

  • Park, Nam-Kyu;Kim, Jin-Pyo;Nam, Jung-Woo;Park, Jong-Taek;Song, Jae-Yong
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.5
    • /
    • pp.13-19
    • /
    • 2017
  • In this paper, study of vehicle fire cases caused by connector and power wiring of anti-lock brake system(ABS) module damage is presented. The purpose of ABS module is to improve braking and steering ability under sudden stop of the vehicle by repeatedly activating and releasing the brake with electric signal via electric control unit. The electric control unit for ABS may experience incomplete contact between power line and signal line or electrical breakdown on the printed circuit board by undergoing repetitive signal change which would consequently result in electrical heat and spark, eventually leading to automotive fire. Therefore, the purpose of this paper is to provide fundamental data by analyzing connector and power wiring of ABS module damage conducive to the precise investigation on the cause of vehicle fire.