• Title/Summary/Keyword: Digital crimes

Search Result 80, Processing Time 0.027 seconds

Study on Factors Affecting Turnover Intention of Digital evidence analyst : Focus on Job stress, Job satisfaction, Organizational commitment (디지털증거분석관의 이직 의도에 영향을 주는 요인에 관한 연구 - 직무스트레스, 직무만족, 조직몰입을 중심으로)

  • Kim, Kyu-Rim;Kwak, Na-Yeon;Lee, Choong C.
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.1-10
    • /
    • 2018
  • With advances in digital technologies digital crimes also rapidly have been increased. For this reason, the digital forensics has an important role in investigating digital crimes. In particular digital evidence analysts have been responsible for more workloads as much increased as it reflects an importance of their task. However previous researches have more focused on technology, not much on their work circumstance and behaviors. This study is to draw out factors affecting job stress and its effects on their turnover rate as it considers Job satisfaction, organization commitment. In this study, survey have been conducted targeting 124 personnel in National Police Agency and then the collected data were analyzed by using Smart PLS 3.0. This study have proved that causal relationship between job stress, satisfaction, commitment and job turnover respectively which is borrowed from organizational concepts. There will be theoretical and practical contribution to improve work circumstance and secure digital forensic talents as well.

Current Status of Response to Digital Child Sexual Slavery and Comparative Analysis of Overseas Crime Prediction System Using Artificial Intelligence (디지털 아동 성착취 대응현황과 해외 인공지능 범죄 예측 시스템 비교분석)

  • Kim, Hyejin
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.357-368
    • /
    • 2020
  • This study identifies the aspects and characteristics of 'Digital Sexual Crimes' that changed rapidly in recent years. It has identified the so-called "Telegram sexual harassment and exploitation" incident on the front page. We also want to analyze this and draw up policy suggestions that can help prepare social measures. In the wake of the Telegram sexual exploitation scandal, The National Assembly is quickly proposing related bills. However, the reality is that even a clear concept and definition of "Digital sexual Crimes" have not been made yet. The effective support system for victims is also insufficient. Therefore, this paper examines the definition and concept of child sexual exploitation and harassment. We will look at the features, causes, and conditions. In addition, it will examine the current status of Digital Sexual Crimes distribution and deletion of domestic, foreign platforms. Major foreign countries, including the U. S. A. refer to cases in which big data and artificial intelligence technologies are actively used to protect victims and track perpetrators.

Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files (삭제되거나 손상된 이벤트 로그(EVTX) 파일 복구 기술에 대한 연구)

  • Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.387-396
    • /
    • 2016
  • As the number of people using digital devices has increased, the digital forensic, which aims at finding clues for crimes in digital data, has been developed and become more important especially in court. Together with the development of the digital forensic, the anti-forensic which aims at thwarting the digital forensic has also been developed. As an example, with anti-forensic technology the criminal would delete an digital evidence without which the investigator would be hard to find any clue for crimes. In such a case, recovery techniques on deleted or damaged information will be very important in the field of digital forensic. Until now, even though EVTX(event log)-based recovery techniques on deleted files have been presented, but there has been no study to retrieve event log data itself, In this paper, we propose some recovery algorithms on deleted or damaged event log file and show that our recovery algorithms have high success rate through experiments.

A Study on Twitter Crawling Techniques for Tracking Digital Sexual Crimes (디지털 성범죄 추적을 위한 트위터 크롤링 기법 연구)

  • Hyeon-Woo Lee;Su-Bin Lee;Dong-Hwi An;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.203-205
    • /
    • 2023
  • 소셜미디어 사용이 증가하면서 성 착취물, 불법 촬영물과 같은 디지털 성범죄 또한 확산되는 추세이다. 소셜미디어에서 검색어 차단 정책 등을 통해 디지털 성범죄를 제재하기 위한 노력이 이루어지고 있으나, 은어 및 다양한 변형어를 사용한 우회 검색을 모두 차단하는 것이 어려울 뿐 아니라, 단시간에도 방대한 양의 데이터가 생성되는 소셜미디어 특성상 범죄 관련 게시글을 모두 식별해 내는 것이 현실적으로 불가능하다. 따라서 능동적이고 고도화된 크롤링 기술 개발을 통해 소셜미디어상의 범죄를 실시간 탐지하는 연구가 필요하다. 본 논문에서는 디지털 성범죄 관련 데이터가 빈번하게 관찰되는 트위터를 대상으로 성 착취물 및 불법 촬영물 정보를 수집하기 위한 검색 키워드를 정의하고, 실제 트위터 크롤링을 수행하여 텔레그램, 디스코드, 라인 등과 같은 다른 소셜미디어에 성범죄물이 유포되는 정황을 URL, 코드, 해시태그 추출을 통해 확보하는 수사 기술을 개발한다.

  • PDF

A Database Forensics Model based on Classification by Analysis Purposes (분석 목적별 분류기반의 데이터베이스 포렌식 모델)

  • Kim, Sung-Hye;Kim, Jang-Won;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.63-72
    • /
    • 2009
  • Digital forensics refers to finding electronic evidences related to crimes. As cyber crimes are increasing daily, digital forensics for finding electronic evidences is also becoming important. At present, various aspects of digital forensics have being researched including the overall process model and analysis techniques such as network forensics, system forensics and database forensics for digital forensics. Regarding database forensics, only analysis techniques dependent on specific vendors have been suggested. And general process models and analysis techniques which can be used in various databases have not been studied. This paper proposes an integrated process model and analysis technique for database forensics. The proposed database forensics model (DFM) allows us to solve problems and analyze databases according to the situation and purpose, and to use a standard model and techniques for various database analyses. In order to test our model(DFM), we applied it to various database analyses. And we confirmed the results of our experiment that it can be applicable to acquisition in the scene as well as analysis of data relationships.

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

Effects of online game addiction on impulsive crime through Self-control (온라인 게임 중독 특성이 자아통제를 통해 충동성 범죄에 미치는 영향)

  • Lee, Jiyeop;Kwon, Dosoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.135-145
    • /
    • 2017
  • Distribution of online media sharply accelerated in the modern society, leading to robust increase in the time where individuals spend their leisure time on the Internet. One of the most popular entertainments among this is the video game industry, which gradually came to possess the characteristics like violence, cruelty, gambling, and sexuality, in order to gain attention. This study aims to investigate the addiction characteristics of users of domestic online games and to verify the causal relationship of these factors on the factors that affect impulsive crimes through Self-control. For practical verification of this study, survey was conducted for students of W High School in Incheon. This study is meaningful in that it prepared a theoretical foundation in the process of inferring criminal intent for impulsive crimes based on the effects of online games on impulsiveness, aggression, and addiction. It is also significant in that it presented a new mechanism that ego control, which occurred in the process of presenting a new variable of negative effect of online game on the criminal intent of impulsive crime, affects impulsive crime.

A Review of Prevention and Treatment of the Crimes on the Characteristics of Mental Illness (정신질환의 특성에 따른 범죄 예방과 치료에 관한 소고)

  • Kim, Myung Shig;Lee, Man Seok
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.549-555
    • /
    • 2021
  • This study reviewed the important preceding studies of prevention and treatment of the crimes and therapies on the characteristics of mental illness, trying to investigate and identify more effective ways to prevent, decrease the crimes of the mentally ill and treat them. The main results were as follows. First, relationships between mental illness and crimes have been inconsistently reported, to investigate environmental stresses and triggers of the mentally ill additionally. Second, the term 'mentally illness' was to be defined more specifically, such as severe psychiatric disabled, antisocial personality disorder, intellectual disability, anger·impulse control disorder, and drug abuse. If medication and psychosocial treatments were properly treated to the severe psychiatric disabled, their crime incidence and recidivism will be decrease enough to live with their neighbors in community. But the ways and processes of treating antisocial personality disorder, intellectual disability, anger·impulse control disorder, and drug abuse were very different from it, requiring more intense psychological, medical and biological interventions and social seclusion. The national campaigns and projects for their human rights and community care will be needed to promote the therapeutic effects for them. The limitation and future tasks were discussed.

A study on procedures of search and seize in digital data

  • Kim, Woon Go
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.

Artificial Intelligence Algorithms, Model-Based Social Data Collection and Content Exploration (소셜데이터 분석 및 인공지능 알고리즘 기반 범죄 수사 기법 연구)

  • An, Dong-Uk;Leem, Choon Seong
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.23-34
    • /
    • 2019
  • Recently, the crime that utilizes the digital platform is continuously increasing. About 140,000 cases occurred in 2015 and about 150,000 cases occurred in 2016. Therefore, it is considered that there is a limit handling those online crimes by old-fashioned investigation techniques. Investigators' manual online search and cognitive investigation methods those are broadly used today are not enough to proactively cope with rapid changing civil crimes. In addition, the characteristics of the content that is posted to unspecified users of social media makes investigations more difficult. This study suggests the site-based collection and the Open API among the content web collection methods considering the characteristics of the online media where the infringement crimes occur. Since illegal content is published and deleted quickly, and new words and alterations are generated quickly and variously, it is difficult to recognize them quickly by dictionary-based morphological analysis registered manually. In order to solve this problem, we propose a tokenizing method in the existing dictionary-based morphological analysis through WPM (Word Piece Model), which is a data preprocessing method for quick recognizing and responding to illegal contents posting online infringement crimes. In the analysis of data, the optimal precision is verified through the Vote-based ensemble method by utilizing a classification learning model based on supervised learning for the investigation of illegal contents. This study utilizes a sorting algorithm model centering on illegal multilevel business cases to proactively recognize crimes invading the public economy, and presents an empirical study to effectively deal with social data collection and content investigation.

  • PDF