• Title/Summary/Keyword: Cyber Crime

Search Result 118, Processing Time 0.025 seconds

The Discrimination of Innocents Exposed to Crime Details using an Autobiographical Implicit Association Test (범죄 정보 인식에 따른 용의자 변별을 위한 aIAT 활용)

  • Kim, Kiho;Lee, Eun-Ji;Lee, Jang-Han
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.173-190
    • /
    • 2020
  • The purpose of this study is to verify whether it is possible for participants to discriminate between innocent and guilty suspects when they are exposed to criminal information utilizing an autobiographical implicit association test (aIAT). A total of 49 college students were randomly assigned to guilty group, innocent-aware group, or innocent-unaware group. Participants performed an aIAT to detect suspects after performing either mock crime or control task. It was verified that innocent suspect and guilty suspect exposed with crime information could be distinguished through D-score and reaction time, converted to symbolize strength of the association between guilty sentences, innocent sentences, and truth sentences. As a result of the analysis, guilty group showed significantly higher D-score than both innocent-aware group and innocent-unaware group. guilty group also showed faster response time in true-guilty condition than true-innocent condition. This shows that the association of true-guilty conditions is stronger than that of true-innocent conditions. On the other hand, the innocent-aware group showed a faster response time in the true-innocent condition than the true-guilty condition, and innocent-unaware group showed no significant difference between the two conditions. Through this, it was confirmed that innocent suspects exposed to criminal information can be discriminated according to the aIAT pattern, which has a faster reaction rate to the truth and innocence union than the guilty group. This study confirmed that suspects exposed to criminal information can be effectively discriminated using aIAT, and further suggests the usefulness and potential of aIAT in the field of lie detection.

  • PDF

An Effective Information Visualization Technique for Intrusion Detection: Hyperbolic View Intrusion Visualizer

  • Jeong, Yun-Seok;Myung, Ro-Hae
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.2
    • /
    • pp.319-330
    • /
    • 2011
  • In computer forensics investigation, the investigators collect, protect, analyze and interpret massive amount of data which were used in cyber crime. However, due to its huge amount of information, it takes a great deal of time and errors often result even when they use forensics investigation tool in the process. The information visualization techniques will greatly help to improve the information processing ability of human when they deal with the overwhelming amount of data and have to find out significant information in it. The importance of Intrusion Detection System(IDS) among network forensics is being emphasized in computer forensics. In this study, we apply the information visualization techniques which are proposed to be a great help to IDS and carry out the usability test to find out the most effective information visualization techniques for IDS.

A Network Transport System Using Next Generation CCN Technology

  • Lee, Hyung-Su;Park, Jae-Pyo;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.93-100
    • /
    • 2017
  • Current internet has evolved from the sharing and efficiency aspects of information, it is still vulnerable to the fact that the Internet is not secure in terms of security and is not safe to secure of security mechanism. Repeating patches on continuous hacking are continuously demanding additional resources for network or system equipment, and consequently the costs continue to increase. Businesses and individuals alike are speeding up the damage caused by crime like of ransomware, not jusy simple attacks, and businesses and individuals need to respond to cyber security. In addition, the ongoing introduce of security device, and separate of networks for secure transmission of contents in the existing TCP/IP system, but it is still lacking in security. To complement the security implications of this existing TCP/IP Internet Protocol, we intend to propose a Secure Contents Transport System (SCTS) on the network using the CCN concept.

Crawling Analysis Implementation of Cyber Crime Information in Deep Web Environment (딥웹 환경에서 사이버범죄 정보 수집분석 구현)

  • Hwang, Deok-Hyun;Park, So-Young;Bae, Ji-Seon;Jeong, Song-Ju;Hong, Jin-Keun;Park, Hyun-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.390-392
    • /
    • 2020
  • 본 논문에서는 딥웹 환경에서 사이버 범죄 활동에 대한 정보를 중심으로 분석한다. 분석된 정보는 사이버 수사기관에 범죄 분석을 위한 보조정보로 활용될 수 있도록 지원하는 것과 청소년들의 사이버 범죄에 대한 위중성 및 범법성을 인지시키기 위한 교육을 목적으로 활용될 수 있도록 연구되었다. 따라서 본 논문에서는 크롤링, 파싱, 시각화 3가지 과정을 기반으로 딥웹 환경에서 활동하고 있는 정보를 키워드를 중심으로 수집하고 분석하는 솔루션 환경을 구현하였다. 분석된 정보는 사이버에서 일어나는 많은 범죄활동 가운데 가장 일어나기 쉬운 범죄 유형과 주의 깊게 수사가 이루어져야 할 범죄들을 정리하며, 수사의 방향성을 캐치 할 수 있도록 지원하는 기능을 포함한다.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

The Comparison on the Investigative Training between the Current Korean National Police and the Law Enforcement Agencies of U.S.A. and Germany (현 대한민국 경찰의 수사교육과 미국, 독일 수사기관과의 비교)

  • Kim, Dae-Sik;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.52-80
    • /
    • 2007
  • In the rapidly changing current society, the Korean National Police(KNP) is facing a lot of demands from the citizens like the protection of subject/victim rights, independence of investigation authority, disclosure of actual truth, and prevention & eradication of crimes. It is widely recognized among the Korean people and the police that the KNP is always standing for the rights of the people and it is high time that the KNP should be restored as the pioneer for the protection of human right. In this situation, the tremendous emphasis is given on the importance of investment in investigative training through the long-term master-plan in order to renovate its constitution, to level up its quality, and to cope with the highly sophisticated crime patterns. Korean police have already shown its outstanding investigative skills of identification of the deceased throughout large cases like Daegu subway arson and tsunami in Southeast Asia. In addition, the skills of cyber crime investigation are highly recognized by foreign law enforcement agencies. However, the investigative skills and abilities are being degraded and the morale of the investigative personnel are falling due to the insufficiently of the finite training budget. Lack of financial support results in the lack of training program and poor training environment, which subsequently leads to the inefficiency of training. Additionally, no long-term budget for fostering specialized investigative agents is allotted. Considering the fact that more than 95% of crimes in Korea are being primarily investigated by the Korean police, we have to understand the importance of the police. By the tremendous investment in investigative training which can lead to the high-quality investigations, the Korean police can ultimately contribute to the protection of safety and life of its people.

  • PDF

Study on the Criminal Information System of Police Cooperation Organization between European Nations (유럽의 국가간 경찰협력기구의 범죄정보시스템에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.263-271
    • /
    • 2008
  • This study is about the criminal information system of police cooperation organization between European nations. The criminal information system of police cooperation organization between European nations is the organization created by the sign of the Europol convention in 26 July 1995 and the effectuation in 1 October 1998 for European nations' cooperative confrontation with frequent international terror, international organization crime, drug trafficking, illegal immigrant smuggling, and other critical crimes. From the beginning, this organization established the criminal information system for overcoming the working limits of previous international police organization. This system consists of information system, work file, and index system and enables every national unit or other law enforcement agents to collect, exchange, and utilize the information. Additionally, it try to keep in step with the rapidly change time, such as the integration with CMS, the establishment of correspondence system against cyber crime, and the introduction of biometric database. The criminal information system of the Europol gives important suggestions to the police cooperation organization between nations, besides prevention and suppression against the international crimes in Europe.

  • PDF

Situation Analysis and Education Plan of Security Ethics for Training College Students Majoring in Information Security (정보보안전공 대학생을 위한 보안 윤리의식 분석 및 교육 방안)

  • Kim, Tae-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.596-605
    • /
    • 2017
  • Recently, it has been pointed out that the lack of professional ethics of computer and security experts is serious as college students majoring in information security and insiders who are in charge of security work are involved in crimes after being tempted to cyber crimes. In this paper, we investigate and analyze the security ethics awareness and education situation of college students majoring in information security, and examine the security ethics education method for human resource development with personality and qualities. As the information society becomes more widespread, the ethics and occupational consciousness of the university students who are majoring in information security are recognized as lack of awareness and education about security ethics, As a solution to solve these problems, it is expected that it will be possible to nurture security experts who are aware of their vocation through the educational plan to enhance the security ethics of the information security major college students. According to the security ethics education system proposed in the paper, the security ethical consciousness of the group that received education was remarkably improved.

A Study on the Realities of Sexual Violence and the Measure for Social Welfare (성폭력 실태와 사회복지적 대책 방안에 관한 연구)

  • Bae, Na-Rae;So, Kwon-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.251-258
    • /
    • 2020
  • This study aims to address the current situation and damage from sexual violence, to arouse public opinion, help broader awareness, and further lead to community social efforts to cope actively with the situation. In Korean society, discourse on sex is often conducted in a double structure. Sexual violence is not just a personal misfortune; it is a problem for women as a whole. Furthermore, it is a challenge that society needs to address. Therefore, the government should evolve its response to sexual violence into a collective, not individual, movement of men and women toward social and cultural movements together. Although the visible reality of sexual violence is important, damaging their mental health by passing on a distorted cultural environment to future generations should be seen as a type of historical crime.