• Title/Summary/Keyword: Computer Crime

Search Result 213, Processing Time 0.021 seconds

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

  • CHOI, Do-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.6
    • /
    • pp.47-55
    • /
    • 2021
  • Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

Digital Forensics Ontology for Intelligent Crime Investigation System (지능형 범죄수사 시스템을 위한 범용 디지털포렌식 온톨로지)

  • Yun, Han-Kuk;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.161-169
    • /
    • 2014
  • Digital forensics is the process of proving criminal charges by collecting and analyzing digital evidence which is related to the crime in question. Most digital forensic research is focused on digital forensic techniques themselves or cyber crime. In this paper, we designed a digital forensics-criminal investigation linked model in order to effectively apply digital forensics to various types of criminal investigations. Digital forensic ontology was developed based on this model. For more effective application of digital forensics to criminal investigation we derived specific application fields. The ontology has legality rules and adequacy rules, so it can support investigative decision-making. The ontology can be developed into an intelligent criminal investigation system.

Reexamination of the Cyber Insult Crime For securing the Internet Ethics (인터넷윤리 확보를 위한 사이버모욕죄의 재검토)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.111-120
    • /
    • 2013
  • Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.

Russian and Foreign Experience in Implementing Departmental Control and Prosecutor's Supervision when Verifying Crime Reports

  • Ivanov, Dmitriy Aleksandrovich;Moskovtseva, Kristina Andreevna;Bui, Thien Thuong;Sheveleva, Kseniya Vladimirovna;Vetskaya, Svetlana Anatolyevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.299-303
    • /
    • 2022
  • The article examines the stage of verification of a crime report from the standpoint of the need for its legislative regulation. Moreover, it investigates the international experience in this field. The existing procedural models are described in detail on the example of the neighboring and faraway countries. An analysis of the provisions of the current criminal procedure law of Russia and foreign experience allowed the authors to identify existing problems in the implementation of departmental control and prosecutorial supervision at the stage of verifying a crime report. The aim of the study is to develop theoretical provisions and recommendations regarding the implementation of departmental procedural control and prosecutorial supervision over the activities of the investigator during the verification of reports of crimes, based on the study of experience, both in Russia and in a number of countries of the near and far abroad, which could find their reflection in law enforcement practice, as well as aimed at improving the current criminal procedure legislation. The authors substantiated the theory that a detailed examination of the foreign procedural foundations of checking a crime report will allow us to form the most suitable model for checking a crime report for our state, taking into account all possible features and successfully implement it into the current criminal procedural law of the Russian Federation.

A Study on Crime Prevention Risk Probability Map Generation Methodology by using the Object Interpretation Key (객체 판독키를 적용한 방범 위험도 확률지도 생성기법 연구)

  • Kim, Dong-Hyun;Park, Koo-Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.135-144
    • /
    • 2009
  • In this paper, a methodology for the risk probability map generation of the crime prevention to be subject to the urban area in the group residential area is presented. The interpretation key is set up to the distinctive feature distinguishing with the unaided eye based on the object composing with the urban area information such as the topology, the facility, and the characteristic information of the corresponding area by analyzing the crime prevention case occurred by gone. This interpretation key is generated, and this information is applied to another area equally, and so, the risk probability map for the crime prevention and the disaster prevention is generated. At this time, the object interpretation key for the urban area information is divided into the various size cell by the crime prevention case. and the risk index according with this cell is set up. Also, the generated various risk probability map is unified, and the integration risk probability map is generated.

A Study on the Countermeasures against International Computer Crimes - Focusing on The Police Investigation Procedure - (컴퓨터범죄의 국가간 대응방안에 관한 연구 - 경찰 수사절차를 중심으로 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.287-295
    • /
    • 2005
  • A Study on the Countermeasures against International Computer Crime focusing on the Police Investigation Procedure. These days, much more intelligent, varied and advanced techniques for computer crimes have been used than for development of technology. In particular, it has been reported that the damages are enormous. Damages of some computer crimes can not be accurately reported. This study is to speculate specific types of computer crimes and obtain its prevention and countermeasures centering on the Police Investigation Procedure. In particular, it is to speculate international cooperation under the condition that global damages occur frequently due to preparation of advanced network environment.

  • PDF

A Study on Comparison Analysis of Digital Forensic Technology for Preventing Information Leakage (정보유출 방지를 위한 디지털 포렌식 기술 비교분석 연구)

  • Park, Gwangmin;Hong, Seungwan;Kim, Jongpil;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.93-100
    • /
    • 2016
  • Important evidence or clue in general crime as well as crime relevant to computer has been discovered in digital devices including computer with advance of information technology and turning into a information-oriented society. A leakage of industrial technology and confidential business information is related to digital devices such as computer, smart phone, USB, etc. This paper deal with a current state and comparison analysis of digital forensic technology for developing way of forensic field, so we seek for method of preventing information leakage.

Current Status of Digital Sex Crime Forensic Technology for Children and Adolescents (아동·청소년 대상 디지털 성범죄 포렌식 기술 현황)

  • Hong, Seoung-Pyo;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.267-268
    • /
    • 2022
  • 디지털 기기의 발전에 따라 우리에게 이로운 효과를 주고 있으나 음지에서는 디지털 성범죄의 피해자가 속출하고 있는 실정이다. 사회적으로 지속해서 대두되고 있는 디지털 성범죄는 그 피해사례가 연간 약 2배 증가하고 있으며, 전체 아동·청소년 성범죄 사례 중 디지털 성범죄가 차지하는 비율은 2018년 6.5%에서 2019년 13.9%로 2.13배 증가하였다. 본 논문에서는 디지털 성범죄의 사회적 인식을 각인시키며 국내외 성범죄 피해사례와 관련 디지털 포렌식 고도 기술 연구에 관한 내용을 제안한다.

  • PDF

Road Networks and Crime Occurrence Multi-Agent Simulation for Smart Safe City (스마트 안전도시 조성을 위한 도로망 특성과 범죄발생 멀티에이전트(Multi-Agent) 시뮬레이션)

  • MOON, Tae-Heon;CHO, Jung-Hun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.120-134
    • /
    • 2015
  • Under the hypothesis that the form of road network could affect crime occurrence, this study demonstrates to prove them using Space Syntax with real crime data. We calculated integration, control, connection index by means of Space Syntax and analyzed the relationship between the three indexes and the number of crime occurrence on the each road. Next, in order to generalize the analysis results we adopted Multi-Agent Model and simulated several scenarios on the computer virtual space. The results revealed that integration index has the strongest relationship with crime occurrence both in the case of real study area and virtual space simulations. Though this study has several limitations on the extent of virtual space and realistic computer programming of agents' behavior, the results are meaningful to verify the relationship between the form of read network and crime occurrence. Moreover the simulation platform that this study developed has promising possibilities to find realistic solutions on the effective police deployment or facility layout to improve smart safe city development.