• Title/Summary/Keyword: digital evidence

Search Result 506, Processing Time 0.031 seconds

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

A Study on the Factors for the Elderly Living in the Community to Determine Their Participation in the Cognitive Improvement Program: With the Application of Anderson Model (지역사회 거주 노인의 인지 향상 프로그램 참여 의사 결정 요인에 관한 연구: 앤더슨 행동 모형(Anderson model)의 적용)

  • Lee, Hey Sig;Park, Da Sol;Park, Hae Yean
    • Therapeutic Science for Rehabilitation
    • /
    • v.11 no.1
    • /
    • pp.87-99
    • /
    • 2022
  • Objective : Through the application of the Anderson model, this study provides an empirical analysis of the decision-making factors for participation in cognitive improvement programs for the elderly living in the community. Methods : This study was conducted through an online survey. The participants were elderly people aged 65 years or older living in the community. The survey had 154 participants and was conducted over a two-month period from August to September 2020. Results : The main results of this study were as follow: first, there was no correlation between the predisposing factors and cognitive improvement program; second, among the enabling factors, diversity, interest, and effectiveness of the program were correlated with the cognitive improvement program; and third, there was no correlation between participation in the cognitive improvement program and need factors. Conclusion : This study shows that the results of basic information and evidence will be identified through analysis of the results of the study and that the implications for the development of cognitive improvement programs will be obtained in the future.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

Early Detection of hyperemia with Magnetic Resonance Fluid Attenuation Inversion Recovery Imaging after Superficial Temporal Artery to Middle Cerebral Artery Anastomosis

  • Jin Eun;Ik Seong Park
    • Journal of Korean Neurosurgical Society
    • /
    • v.67 no.4
    • /
    • pp.442-450
    • /
    • 2024
  • Objective : Cerebral hyperperfusion syndrome (CHS) manifests as a collection of symptoms brought on by heightened focal cerebral blood flow (CBF), afflicting nearly 30% of patients who have undergone superficial temporal artery (STA)-middle cerebral artery (MCA) anastomosis. The aim of this study was to investigate whether the amalgamation of magnetic resonance imaging (MRI) fluid-attenuated inversion recovery (FLAIR) and apparent diffusion coefficient (ADC) imaging via MRI can discern cerebral hyperemia after STA-MCA anastomosis surgery. Methods : A retrospective study was performed of patients who underwent STA-MCA anastomosis due to Moyamoya disease or atherosclerotic steno-occlusive disease. A protocol aimed at preventing CHS was instituted, leveraging the use of MRI FLAIR. Patients underwent MRI diffusion with FLAIR imaging 24 hours after STA-MCA anastomosis. A high signal on FLAIR images signified the presence of hyperemia at the bypass site, triggering a protocol of hyperemia care. All patients underwent hemodynamic evaluations, including perfusion MRI, single-photon emission computed tomography (SPECT), and digital subtraction angiography, both before and after the surgery. If a high signal intensity is observed on MRI FLAIR within 24 hours of the surgery, a repeat MRI is performed to confirm the presence of hyperemia. Patients with confirmed hyperemia are managed according to a protocol aimed at preventing further progression. Results : Out of a total of 162 patients, 24 individuals (comprising 16 women and 8 men) exhibited hyperemia on their MRI FLAIR scans following the procedure. SPECT was conducted on 23 patients, and 11 of them yielded positive results. All 24 patients underwent perfusion MRI, but nine of them showed no significant findings. Among the patients, 10 displayed elevations in both CBF and cerebral blood volume (CBV), three only showed elevation in CBF, and two only showed elevation in CBV. Follow-up MRI FLAIR scans conducted 6 months later on these patients revealed complete normalization of the previously observed high signal intensity, with no evidence of ischemic injury. Conclusion : The study determined that the use of MRI FLAIR and ADC mapping is a competent means of early detection of hyperemia after STA-MCA anastomosis surgery. The protocol established can be adopted by other neurosurgical institutions to enhance patient outcomes and mitigate the hazard of permanent cerebral injury caused by cerebral hyperemia.

Effects of Family-Centered Intervention for Children with Autism Spectrum Disorder in South Korea: A Systematic Review - Focusing on Parent Education and Parent Coaching - (국내 자폐스펙트럼장애 아동에 대한 가족 중심 중재 효과: 체계적 고찰 - 부모 교육 및 부모 코칭 중심으로 - )

  • Choi, Yoon-Mi;Yoo, Eun-Young
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.21 no.3
    • /
    • pp.65-78
    • /
    • 2023
  • Objective : In this study, we aimed to investigate the effectiveness of family-centered intervention conducted with caregivers of children with autism spectrum disorder (ASD) in South Korea through a systematic literature review. Methods : Previous studies published from 2011 to 2021 were searched through RISS, KISS, and DBpia. The search terms applied included "autism spectrum" OR "general developmental disorder" OR "high-functioning autism" OR "Asperger's" AND "parent education" OR "family-centered intervention" OR "parent coaching" OR "parent training" OR "family participation." A total of 11 experimental studies were chosen based on the selection criteria. Results : According to the findings on the general characteristics of the study participants, intervention strategies, and effects of the intervention, it was observed that the majority of children with ASD who participated in the study were preschool-aged, and the majority of participating caregivers were mothers. The effects of family-centered interventions were evident in both children and parents. In children, the most significant effects were observed in interaction and communication skills. In parents, a reduction in parenting stress and an improvement in parenting efficacy were observed. The intervention strategies employed in the study varied, with sensory integration intervention, responsive communication, and interaction-centered intervention being the most commonly used, followed by developmental-centered intervention, positive behavior support (PBS), and parent-mediated intervention based on pivotal response treatment (PRT). Conclusion : The results of this study are significant in that they confirm that family-centered intervention is effective not only in improving the functioning of children with autism spectrum disorder, but also in reducing parenting stress and enhancing parenting efficacy, and provide evidence for clinical use.

A Study on Setting Expected Targets for Satisfaction with the Frequency of Use of Construction Technology Information (건설기술정보의 활용 빈도 만족도에 대한 기대 목표치 설정에 관한 연구)

  • Seong-Yun Jeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.251-268
    • /
    • 2024
  • Recently, with the implementation of the "e-Government Performance Management Guidelines," there is a growing demand for setting performance indicators for information systems. For systems that provide information services to the public, such as CODIL, it is not easy to set performance indicators. This study presented a research model that applies Monte Carlo simulation to set expected performance targets that can be achieved through CODIL based on objective evidence. Among the survey contents conducted from 2015 to 2023, the statistical characteristics of user satisfaction regarding the frequency of use of construction technology information provided by CODIL were designated as input variables. Future expected targets and confidence intervals from 2024 to 2026 were designated as outcome variables. The expected target value was measured by generating 5 simulation alternatives and 1,000 random numbers for each alternative. Next, the measured expected goals were interpreted and compared with the results of time series regression analysis measured in previous studies. Although, as in previous studies, the expected target value could not be predicted based on time series regression analysis that considers the correlation between years. However, compared to previous studies, this study can be considered a more accurate analysis result because it predicted the expected target value based on 5,000 input variables.

Imaging follow-up strategy after endovascular treatment of Intracranial aneurysms: A literature review and guideline recommendations

  • Yong-Hwan Cho;Jaehyung Choi;Chae-Wook Huh;Chang Hyeun Kim;Chul Hoon Chang;Soon Chan KWON;Young Woo Kim;Seung Hun Sheen;Sukh Que Park;Jun Kyeung Ko;Sung-kon Ha;Hae Woong Jeong;Hyen Seung Kang;Clinical Practice Guideline Committee of the Korean Neuroendovascular Society
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • Objective: Endovascular coil embolization is the primary treatment modality for intracranial aneurysms. However, its long-term durability remains of concern, with a considerable proportion of cases requiring aneurysm reopening and retreatment. Therefore, establishing optimal follow-up imaging protocols is necessary to ensure a durable occlusion. This study aimed to develop guidelines for follow-up imaging strategies after endovascular treatment of intracranial aneurysms. Methods: A committee comprising members of the Korean Neuroendovascular Society and other relevant societies was formed. A literature review and analyses of the major published guidelines were conducted to gather evidence. A panel of 40 experts convened to achieve a consensus on the recommendations using the modified Delphi method. Results: The panel members reached the following consensus: 1. Schedule the initial follow-up imaging within 3-6 months of treatment. 2. Noninvasive imaging modalities, such as three-dimensional time-of-flight magnetic resonance angiography (MRA) or contrast-enhanced MRA, are alternatives to digital subtraction angiography (DSA) during the first follow-up. 3. Schedule mid-term follow-up imaging at 1, 2, 4, and 6 years after the initial treatment. 4. If noninvasive imaging reveals unstable changes in the treated aneurysms, DSA should be considered. 5. Consider late-term follow-up imaging every 3-5 years for lifelong monitoring of patients with unstable changes or at high risk of recurrence. Conclusions: The guidelines aim to provide physicians with the information to make informed decisions and provide patients with high-quality care. However, owing to a lack of specific recommendations and scientific data, these guidelines are based on expert consensus and should be considered in conjunction with individual patient characteristics and circumstances.

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.