• Title/Summary/Keyword: 증거정보

Search Result 739, Processing Time 0.022 seconds

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

Affects in and of Archives : Focused on 4.16 Memory Storage (정동의 기록화 '4.16 기억저장소'를 중심으로)

  • Lee, Kyong Rae
    • The Korean Journal of Archival Studies
    • /
    • no.74
    • /
    • pp.5-43
    • /
    • 2022
  • This study aims to explore the 'affective value' of records. Traditionally, records have been evaluated as having evidence value, information value, and artificial value. However, the 'affective turn' in the humanities and social sciences, which began in the 1990s, calls for discussion on the affective value of records. The overseas archive academia is in full swing discussing the emotional value of records after the 'affective turn'. However, there is no emotional discussion on records in the domestic archive academia. This study first conducts theoretical discussions to overcome these domestic limitations and explore the emotional value of archives in earnest. Following the theoretical discussion, a specific case will be dealt with next. As a representative storage of affect, which records the pain, sadness, and condolences of the domestic disaster era, this study investigates the record management case of the 4.16 Memory Storage. The Ferry Sewol disaster, which provided a dramatic opportunity to witness the unexpected ripple effect of affect in Korea, and the 4.16 Memory Storage as a recording activity, can be seen as a representative example of affective recording of the pain and sadness of survivors of the trauma incident. It will capture the differentiation of affet recording, which is different from the record management practice, and demonstrate empirically how this differentiation is implemented from collection to evaluation and service through the '4.16 Memory Storage'.

The Effect of Investigators' Perception of the Importance of Investigative Elements on Their Intention to Use Profiling: Mediating Effect of Attitude toward Profiling (수사관의 수사요소 중요도 인식이 프로파일링 활용 의도에 미치는 영향: 프로파일링에 대한 태도의 매개효과)

  • Shin, Sangwha;Yoon, Sangyeon
    • Korean Journal of Forensic Psychology
    • /
    • v.13 no.1
    • /
    • pp.75-97
    • /
    • 2022
  • Profiling is recognized as a representative application area of domestic criminal psychology, and the National Police Agency profiler is firmly established as a profession. However, compared to the social awareness, the recognition and utilization within the police is not high. In this study, we tried to identify factors affecting the intention to use profiling by identifying the perception of investigators who request and use profiling from a profiler when a violent incident occurs. To this end, the relationship between the perception of the importance of factors considered by investigators in the criminal investigation process and the attitude toward profiling on the intention to use profiling was verified through the path model. As a result of a survey of 340 police investigators, the investigator's perception of the importance of investigation elements was divided into two factors: the importance of normative investigative elements (evidence collection and legal judgment, etc.) and factual investigative elements (criminal analysis, criminal information system analysis, etc.). Among them, the importance of factual investigative elements were found to have a positive effect on the intention to use it by mediating the attitude toward profiling. On the other hand, in the case of the importance of normative investigative elements, it was found to have a negative effect on the attitude toward profiling. These results suggest that the perception that investigators have about investigation, which is their main work area, plays a role in determining whether to request profiling as well as attitude towards profiling. Based on the research results, strategies necessary to activate the use of profiling were discussed.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

A Study on the Design of the Appraisal System of Permanent Archival Institutions : Focused on the Seoul Metropolitan Archives (영구기록물관리기관의 재평가체계 설계 연구 서울기록원을 중심으로)

  • Lee, Eunjung;Kim, Dabeen;Kim, Sunyou;Kim, Heejin;Ryu, Hanjo
    • The Korean Journal of Archival Studies
    • /
    • no.76
    • /
    • pp.5-37
    • /
    • 2023
  • This study aimed to design an evaluation system applicable to permanent record management institutions, focusing on the Seoul Archives, in order to implement the reevaluation of permanent record management institutions. As a process for this, an area for evaluating evidence, administrative, and historical values was established and detailed evaluation factors were derived. In order to effectively apply the set evaluation factors, the evaluation procedure was designed by dividing them into three stages. In the first stage of law-based evaluation, long-term preservation was determined by identifying the position and legal form of policymakers that can be immediately evaluated according to clear standards. Records that have not been determined for long-term preservation were reorganized into evaluation factors, such as record management standards, official document classification tables, pledges, and policies, which are the second stage of business function-based evaluation, and then comprehensively applied to review the validity of long-term preservation of held records. In the second stage of evaluation, records that were not judged as long-term preservation were judged by applying historical events, cultural assets, and collection policies in the subject-based evaluation stage, which is the third stage of evaluation. The designed evaluation system can find significance in minimizing the arbitrariness reflected in the evaluation and increasing the efficiency of the evaluation, and it has been confirmed that it is possible to evaluate comprehensively reflecting the various contexts and values of the records. In addition, a re-evaluation system suitable for permanent records management institutions was established by combining balanced macro-evaluation and micro-evaluation.

Systemic literature review on the impact of government financial support on innovation in private firms (정부의 기술혁신 재정지원 정책효과에 대한 체계적 문헌연구)

  • Ahn, Joon Mo
    • Journal of Technology Innovation
    • /
    • v.30 no.1
    • /
    • pp.57-104
    • /
    • 2022
  • The government has supported the innovation of private firms by intervening the market for various purposes, such as preventing market failure, alleviating information asymmetry, and allocating resources efficiently. Although the government's R&D budget increased rapidly in the 2000s, it is not clear whether the government intervention has made desirable impact on the market. To address this, the current study attempts to explore this issue by doing a systematic literature review on foreign and domestic papers in an integrated way. In total, 168 studies are analyzed using contents analysis approach and various lens, such as policy additionality, policy tools, firm size, unit of analysis, data and method, are adopted for analysis. Overlapping policy target, time lag between government intervention and policy effects, non-linearity of financial supports, interference between different polices, and out-dated R&D tax incentive system are reported as factors hampering the effect of the government intervention. Many policy prescriptions, such as program evaluation indices reflecting behavioral additionality, an introduction of policy mix and evidence-based policy using machine learning, are suggested to improve these hurdles.

Convertible Bond Issue Announcements and Stock Price Changes: Focusing on Domestic and Offshore CB Issues (전환사채 발행공시와 주식가격 변화: 국내외 전환사채 발행을 중심으로)

  • Lee, Hyun-Chul
    • International Area Studies Review
    • /
    • v.15 no.1
    • /
    • pp.87-106
    • /
    • 2011
  • Using an event study, this paper investigates stock price reactions on Korean listed firms' convertible bond (CB) issue announcements over the sample period of January 2000 to November 2007. This study finds that on the Korean Security market, the CB issue announcements are associated with an increase in shareholder wealth on the announcement date. An information leakage by insider traders is also observable at preannouncement dates. Unlike the prior studies that indicate a prevailing negative effect on the announcements, this paper shows that domestic CB issue announcements as well as offshore ones yield a positive impact on the stock prices. This presents that in terms of stock price reactions to the CB issue announcements, the two CB issue markets show the positively same effects on shareholder wealth for the post-2000 period. For its drivers, this paper suggests that on the Korean market, firm size have negative relationship with the increase in the wealth incurred by the announcements. By contrast, an issue to maturity, a growth opportunity, and a relative issue size make a positive impact on it.

Speaker verification with ECAPA-TDNN trained on new dataset combined with Voxceleb and Korean (Voxceleb과 한국어를 결합한 새로운 데이터셋으로 학습된 ECAPA-TDNN을 활용한 화자 검증)

  • Keumjae Yoon;Soyoung Park
    • The Korean Journal of Applied Statistics
    • /
    • v.37 no.2
    • /
    • pp.209-224
    • /
    • 2024
  • Speaker verification is becoming popular as a method of non-face-to-face identity authentication. It involves determining whether two voice data belong to the same speaker. In cases where the criminal's voice remains at the crime scene, it is vital to establish a speaker verification system that can accurately compare the two voice evidence. In this study, to achieve this, a new speaker verification system was built using a deep learning model for Korean language. High-dimensional voice data with a high variability like background noise made it necessary to use deep learning-based methods for speaker matching. To construct the matching algorithm, the ECAPA-TDNN model, known as the most famous deep learning system for speaker verification, was selected. A large dataset of the voice data, Voxceleb, collected from people of various nationalities without Korean. To study the appropriate form of datasets necessary for learning the Korean language, experiments were carried out to find out how Korean voice data affects the matching performance. The results showed that when comparing models learned only with Voxceleb and models learned with datasets combining Voxceleb and Korean datasets to maximize language and speaker diversity, the performance of learning data, including Korean, is improved for all test sets.

The Impact of Organizational Internal IT Capability on Agility and Performance: The Moderating Effect of Managerial IT Capability and Top Management Championship (기업 내적 IT 자원이 기업 민첩성과 성과에 미치는 영향: 관리적 IT 능력과 경영진 존재의 조절효과)

  • Kim, Geuna;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.39-69
    • /
    • 2013
  • Business value of information technology has been the biggest interest of all such as practitioners and scholars for decades. Information technology is considered as the driving force or success factor of firm agility. The general assumption is that organizations making considerable efforts in IT investment are more agile than the organizations that are not. However, IT that should help the strategies of the firm that can hinder business or impede agility of the firm occasionally. In other words, it is still unknown if IT helps the agility of the firm or bothers it. Therefore, we note that contrary aspects of IT such as promotion and hindrance of firm agility have been observed frequently and theorize the relationships between them. In other words, we propose a rationale that firms should need to develop superior firm-wide IT capability to manage IT resources successfully in order to realize agility. Thus, this paper theorizes two IT capabilities, including technical IT capability and managerial IT capability as key factors impacting firm agility and firm performance. Further, we operationalize firm agility into two sub-types, including operational adjustment agility and market capitalizing agility. The data from 171 firms was analyzed using PLS approach. The results showed that technical IT capability has positive impact on firm agility and managerial IT capability had positive moderating effects between technical IT capability and firm agility. In addition, it was identified that top management championship positively moderates between agility and firm performance. Finally, it was indicated that firm agility was a very important causal variable of firm performance. Our study provides more exquisite and practical empirical evidences in the relationship between IT capability and firm agility by proposing applicable solution although IT has some contradicting effects on firm agility. Our findings suggest many useful implications to agility related researches in relatively primitive stage and working level officers in organizations.

  • PDF

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF