• Title/Summary/Keyword: digital evidence

Search Result 484, Processing Time 0.024 seconds

The Method of Verification for Legal Admissibility of Digital Evidence using the Digital Forensics Ontology (디지털 포렌식 온톨로지를 이용한 디지털 증거의 증거능력에 대한 검증 방법)

  • Cho, Hyuk-Gyu;Park, Heum;Kwon, Hyuk-Chul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.265-272
    • /
    • 2009
  • Although the various crime involved numerous digital evidence, the digital evidence is hard to be acknowledged as a evidence to proof the crime fact in court. We propose the method of verification for the legal admissibility of digital evidence using digital forensics ontology. In order to verify the legal admissibility of digital evidence, we will extend the digital ontology by standard digital forensics process from Digital Forensics Technical Manual defined by KNPA and set up the relation properties and the rule of property constraint to process class in the digital forensics ontology. It is possible for proposed ontology to utilize to plan the criminal investigation and to educate the digital forensics.

A study on procedures of search and seize in digital data

  • Kim, Woon Go
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

A Study on the Improvement Effect of Hospital Digital Signage for Room Spaces - Applying the Evidence-Based Design(EBD) Process (병원 진료 안내 디지털 사이니지 개선 효과 연구- 근거기반디자인(EBD) 과정을 적용하여)

  • Kwon, Youngmi;Lee, Seungji
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.29 no.1
    • /
    • pp.21-28
    • /
    • 2023
  • Purpose: Evidence-based design is the process of making design decisions based on reliable research to achieve the best results, so it is important to accumulate reliable evidence through research. Therefore, the purpose of this study is to present new evidence by applying the evidence-based design process to improve the digital signage for each room spaces in hospitals and verifying its effectiveness. Method: Through the 8-step process of evidence-based design, improved digital signage for each room spaces are installed. It conducted surveys and statistical analysis to prove hypotheses by linking design and research. Results: The hypotheses established in the study are: 1) improvement in the readability of digital signage is correlated with patient satisfaction; 2) Improving the intuitiveness of digital signage correlates with patient satisfaction; 3) Improving the sufficiency of digital signage correlates with patient satisfaction. As a result of satisfaction analysis and correlation analysis, all of the above hypotheses were proven. Implications: Although the hospital sign system is the element that patients rely on most intuitively in the long journey of reception, waiting, examination, and treatment, there is insufficient evidence to refer to or apply it when designing. It is necessary to expand future research to expand the evidence that can be applied to hospital sign design.

A Study on the Providing the Integrity of Digital Evidence while Deleting the irrelevant File (디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구)

  • Kim, TaeKyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.111-116
    • /
    • 2019
  • The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

International Trends of Digital Health and It's Political Implication for Health Technology Assessment (디지털헬스 정책환경의 국제 동향과 의료기술평가에 대한 시사점)

  • Choi, Solji;Cha, Sunmi;Yoo, Keunjoo;Hong, Seokwon;Park, Chong Yon
    • The Journal of Health Technology Assessment
    • /
    • v.6 no.2
    • /
    • pp.95-99
    • /
    • 2018
  • As technologies develop, the digital health sector is gradually expanding. Internationally, the global summit for Digital Health named Global Digital Health Partnership (GDHP) was launched in 2018. Many countries are participating in GDHP and share their policy experiences on digital health and find the ways to cooperate with participating countries (13 countries, including South Korea, and Hong Kong). This article reviewed the international trends in digital health policy environment and evidence assessment focusing on GDHP activities, and derived implications for health technology assessment of digital health. Consequently, to assess the intervention effects of digital health is very complex and the assessment should be considered multidimensional aspects (social, clinical, and technical). In addition the patient experience should be assessed qualitatively. Health technology assessment (HTA) should assess the effect of digital health policies to changes in health care systems resulting from the application of advanced technologies related to the 4th Industrial Revolution. Digital health is also related to new HTA, HTA of existing technologies, and R&D on the promising health technology. Therefore, it is necessary to review the trends of the technology's management policy consistently through the HTA of digital health.

A Study on Securing the Quality of Trusted Digital Records as Evidence: Focusing on Analysis of Quality Concept and Requirements for Records and Evidence Respectively Covered in Records Management and Judicial Domain (증거로서 신뢰할 수 있는 전자기록의 품질 확보방안 연구 - 기록관리영역과 사법영역에서 다루는 기록과 증거의 품질 개념과 요건 분석을 중심으로 -)

  • Lee, Gemma;Oh, Kyung-Mook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.217-246
    • /
    • 2021
  • This study aimed to analyze the quality concepts and requirements of digital records as evidence and to find an implication to develop requirements for trusted digital records with securing authoritative qualities. To this end, this study compared requirements of records domain linking records process, records metadata and records systems with judicial domain on digital evidence, and identified the records requirements to secure the legal admissibility linking records and judicial domain. This study analyzed the relationship of quality concepts between digital records and digital evidence, found the legal admissibility is highly related to the reliability, and derived that it needs the measure to secure the reliability at the stage of records creation and capture. To prove authenticity of digital evidence, this study identified importance of records process, records metadata and records system, and proposed the necessity of measurement to secure records' evidence.

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

A Mechanism for Securing Digital Evidences of Computer Forensics in Smart Home Environment (스마트홈 환경에서 컴퓨터 포렌식스의 디지털 증거 무결성 보증 메커니즘)

  • Lee, Jong-Sup;Park, Myung-Chan;Jang, Eun-Gyeom;Choi, Yong-Rak;Lee, Bum-Suk
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.93-120
    • /
    • 2007
  • A Smart Home is a technically expanded from home network that gives us a comfortable life. But still there is a problem such as mal function of devices and intrusions by malicious parties since it is based on home network. The intrusion by malicious parties causes a critical problem to the individual's privacy. Therefore to take legal actions against to the intruders, the intrusion evidence collecting and managing technology are widely researched in the world. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That's why we have to prove the evidence's integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

  • PDF

Efficiency Improvement about Digital Evidence Investigation in Korea (우리나라 디지털 증거수사의 효율성 증진방안)

  • Kang, Maeng-Jin;Kim, Joung-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.180-190
    • /
    • 2007
  • Recently investigation institutions have found the clue leading to solution of the problem by digital evidence. Digital medium is used extensively in real life. Accordingly, offender is leaving from traces of crime to digital form. But, Korea's digital evidence investigation is low level yet. Definite legislation about digital evidence is not readied in present our country. And professional investigation manpower about digital evidence is insufficient. These problem may have to be supplemented urgently. Systematic, technological supporting is required. Specialize and discussed digital evidence investigation's controversial point and capacity reinforcement way for efficient confrontation in cyber crime who is diversified gradually in text.