Jake Jang - Academia.edu (original) (raw)

Papers by Jake Jang

Research paper thumbnail of 최신 스마트 TV 데이터 획득 기법 분석: 2018년 삼성 제품의 사례

Journal of Digital Forensics, 2019

Research paper thumbnail of Interconnecting Education and Research Through International Partnership: IoT Case Study

2018 28th EAEEIE Annual Conference (EAEEIE), 2018

The university attempts to meet two basic needs for society: education and research. In most case... more The university attempts to meet two basic needs for society: education and research. In most cases these roles are separated. Undergraduate (Bachelor) and graduate (Masters) students are focused more on education while the research is designated for post-graduate students. This paper shows how education and research can be interconnected through students' engagement in research carried out at the university. Such activity can be funded by various national, EU and non-EU grants that support international partnership and encourage universities to improve student competencies through student research. The paper discusses the gap between research and education in the universities, and provides a case study showing how this issue can be tackled using student research teams participating in scientific projects. The study is demonstrated with the joint IoT research project realized by two universities in the Czech Republic and South Korea from 2016 to 2018.

Research paper thumbnail of Estimation of Fingerprint Image Quality in Accordance with Photographing Conditions

The Journal of the Korea Contents Association, 2017

This study is aimed at observing effects of fingerprint image quality on various photographing co... more This study is aimed at observing effects of fingerprint image quality on various photographing conditions in the aspect of resolution. Discrimination between two friction ridges plays an important role in the value of fingerprint image, and it can be confirmed with quantification of pixels of boundary region which is existing between two friction ridges. In this study, several factors were estimated with same fingerprint image using Adobe photoshop CS 6 for analysis: changes of image quality by ISO, movement when photographing, and photographers' experience and skill. Consequently, there was no significant change of image quality by ISO. Furthermore, there was no significant difference in the hand-held images between crime scene investigators and laymen, yet there was significant difference between hand-held images and images using tripod in the aspect of resolution. This study shows that using tripod is very important in forensic fingerprint photography through empirical method...

Research paper thumbnail of 경찰 위치추적권 활용의 법적ㆍ기술적 문제와 개선방안

Research paper thumbnail of The Effect of CCTV Perception on Women’s Fear of Crime

Research paper thumbnail of Practical and Legal Challenges of Cloud Investigations

The Journal of the Institute of Webcasting, Internet and Telecommunication, 2014

An area presenting new opportunities for both legitimate business, as well as criminal organizati... more An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.

Research paper thumbnail of A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement

Digital Investigation, 2018

Many data breaches happened due to poor implementation or complete absence of security controls i... more Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations.

Research paper thumbnail of Update Thresholds of More Accurate Time Stamp for Event Reconstruction

The Journal of the Institute of Internet Broadcasting and Communication, 2017

Many systems rely on reliable timestamps to determine the time of a particular action or event. T... more Many systems rely on reliable timestamps to determine the time of a particular action or event. This is especially true in digital investigations where investigators are attempting to determine when a suspect actually committed an action. The challenge, however, is that objects are not updated at the exact moment that an event occurs, but within some time-span after the actual event. In this work we define a simple model of digital systems with objects that have associated timestamps. The model is used to predict object update patterns for objects with associated timestamps, and make predictions about these update time-spans. Through empirical studies of digital systems, we show that timestamp update patterns are not instantaneous. We then provide a method for calculating the distribution of timestamp updates on a particular system to determine more accurate action instance times.

Research paper thumbnail of Digital Investigation First Responder and Preliminary Analyst Requirements

The Journal of the Institute of Internet Broadcasting and Communication, 2016

Research paper thumbnail of 감열지에 남겨진 잠재지문 현출을 위한 1,2-Indanedione 시약

The Journal of the Korea Contents Association, 2014

It is impossible to use general latent fingerprint developing reagents with thermal paper because... more It is impossible to use general latent fingerprint developing reagents with thermal paper because it is very sensitive to change its color when exposed to heat and polarized solvents. The present study set up the applicapable ratio of 1,2-Indanedione solution demonstrating the effect of zinc chloride. There is no difference in results and the term of validity in solution containing under 3% of polarized solvent. And the solution without zinc chloride has better result in fluorescence.

Research paper thumbnail of Measuring Digital Crime Investigation Capacity to Guide International Crime Prevention Strategies

Lecture Notes in Electrical Engineering, 2014

This work proposes a method for the measurement of a country's digital investigation capacity and... more This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing with digital crime, target international partners should be a consideration in expansion, and could potentially be a bottleneck of investigation requests.

Research paper thumbnail of An Assessment Model for Cybercrime Investigation Capacity

arXiv (Cornell University), Jun 29, 2013

Digital technologies are constantly changing, and with it criminals are finding new ways to abuse... more Digital technologies are constantly changing, and with it criminals are finding new ways to abuse these technologies. Cybercrime investigators, then, must also keep their skills and knowledge up to date. This work proposes a holistic training development model-specifically focused on cybercrime investigation-that is based on improving investigator capability while also considering the capacity of the investigator or unit. Along with a training development model, a cybercrime investigation capacity assessment framework is given for attempting to measure capacity throughout the education process. First, a training development model is proposed that focuses on the expansion of investigation capability as well as capacity of investigators and units. Next, a capacity assessment model is given to evaluate the effectiveness of the training program. A description of how the proposed model is being applied to the development of training programs for cybercrime investigators in developing countries will then be given, as well as already observed challenges. Finally, concluding remarks as well as proposed future work is discussed.

Research paper thumbnail of A Study on the Penalties for Possessing Child Pornography - Focused on Moral Panic Model

The possession of child pornography has become one of main issues because the investigations of c... more The possession of child pornography has become one of main issues because the investigations of child-sex offenders revealed that child-sex offenders stored lots of child pornography and watched them before or after they committed sex offenses against children. The Korean National Police Agency prosecuted 1,411 cases in 2012 and 2,654 cases in 2013 in child pornography crackdown. There have been differences of opinions on the penalties for possessing child pornography.
This research analyzed the penalties for possessing child pornography with moral panic model. We surveyed public perceptions on the penalties for possessing child pornography and investigators’ perceptions on the issue.
The results indicated that public insisted that the penalties for possessing child pornography should be strengthened while investigators reported that the current penalties for possessing child pornography are appropriate. While these findings contribute to our understanding of the penalties for possessing child pornography in Korea, further research is needed to develop more appropriate policies on child pornography.

Research paper thumbnail of 최신 스마트 TV 데이터 획득 기법 분석: 2018년 삼성 제품의 사례

Journal of Digital Forensics, 2019

Research paper thumbnail of Interconnecting Education and Research Through International Partnership: IoT Case Study

2018 28th EAEEIE Annual Conference (EAEEIE), 2018

The university attempts to meet two basic needs for society: education and research. In most case... more The university attempts to meet two basic needs for society: education and research. In most cases these roles are separated. Undergraduate (Bachelor) and graduate (Masters) students are focused more on education while the research is designated for post-graduate students. This paper shows how education and research can be interconnected through students' engagement in research carried out at the university. Such activity can be funded by various national, EU and non-EU grants that support international partnership and encourage universities to improve student competencies through student research. The paper discusses the gap between research and education in the universities, and provides a case study showing how this issue can be tackled using student research teams participating in scientific projects. The study is demonstrated with the joint IoT research project realized by two universities in the Czech Republic and South Korea from 2016 to 2018.

Research paper thumbnail of Estimation of Fingerprint Image Quality in Accordance with Photographing Conditions

The Journal of the Korea Contents Association, 2017

This study is aimed at observing effects of fingerprint image quality on various photographing co... more This study is aimed at observing effects of fingerprint image quality on various photographing conditions in the aspect of resolution. Discrimination between two friction ridges plays an important role in the value of fingerprint image, and it can be confirmed with quantification of pixels of boundary region which is existing between two friction ridges. In this study, several factors were estimated with same fingerprint image using Adobe photoshop CS 6 for analysis: changes of image quality by ISO, movement when photographing, and photographers' experience and skill. Consequently, there was no significant change of image quality by ISO. Furthermore, there was no significant difference in the hand-held images between crime scene investigators and laymen, yet there was significant difference between hand-held images and images using tripod in the aspect of resolution. This study shows that using tripod is very important in forensic fingerprint photography through empirical method...

Research paper thumbnail of 경찰 위치추적권 활용의 법적ㆍ기술적 문제와 개선방안

Research paper thumbnail of The Effect of CCTV Perception on Women’s Fear of Crime

Research paper thumbnail of Practical and Legal Challenges of Cloud Investigations

The Journal of the Institute of Webcasting, Internet and Telecommunication, 2014

An area presenting new opportunities for both legitimate business, as well as criminal organizati... more An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.

Research paper thumbnail of A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement

Digital Investigation, 2018

Many data breaches happened due to poor implementation or complete absence of security controls i... more Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations.

Research paper thumbnail of Update Thresholds of More Accurate Time Stamp for Event Reconstruction

The Journal of the Institute of Internet Broadcasting and Communication, 2017

Many systems rely on reliable timestamps to determine the time of a particular action or event. T... more Many systems rely on reliable timestamps to determine the time of a particular action or event. This is especially true in digital investigations where investigators are attempting to determine when a suspect actually committed an action. The challenge, however, is that objects are not updated at the exact moment that an event occurs, but within some time-span after the actual event. In this work we define a simple model of digital systems with objects that have associated timestamps. The model is used to predict object update patterns for objects with associated timestamps, and make predictions about these update time-spans. Through empirical studies of digital systems, we show that timestamp update patterns are not instantaneous. We then provide a method for calculating the distribution of timestamp updates on a particular system to determine more accurate action instance times.

Research paper thumbnail of Digital Investigation First Responder and Preliminary Analyst Requirements

The Journal of the Institute of Internet Broadcasting and Communication, 2016

Research paper thumbnail of 감열지에 남겨진 잠재지문 현출을 위한 1,2-Indanedione 시약

The Journal of the Korea Contents Association, 2014

It is impossible to use general latent fingerprint developing reagents with thermal paper because... more It is impossible to use general latent fingerprint developing reagents with thermal paper because it is very sensitive to change its color when exposed to heat and polarized solvents. The present study set up the applicapable ratio of 1,2-Indanedione solution demonstrating the effect of zinc chloride. There is no difference in results and the term of validity in solution containing under 3% of polarized solvent. And the solution without zinc chloride has better result in fluorescence.

Research paper thumbnail of Measuring Digital Crime Investigation Capacity to Guide International Crime Prevention Strategies

Lecture Notes in Electrical Engineering, 2014

This work proposes a method for the measurement of a country's digital investigation capacity and... more This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing with digital crime, target international partners should be a consideration in expansion, and could potentially be a bottleneck of investigation requests.

Research paper thumbnail of An Assessment Model for Cybercrime Investigation Capacity

arXiv (Cornell University), Jun 29, 2013

Digital technologies are constantly changing, and with it criminals are finding new ways to abuse... more Digital technologies are constantly changing, and with it criminals are finding new ways to abuse these technologies. Cybercrime investigators, then, must also keep their skills and knowledge up to date. This work proposes a holistic training development model-specifically focused on cybercrime investigation-that is based on improving investigator capability while also considering the capacity of the investigator or unit. Along with a training development model, a cybercrime investigation capacity assessment framework is given for attempting to measure capacity throughout the education process. First, a training development model is proposed that focuses on the expansion of investigation capability as well as capacity of investigators and units. Next, a capacity assessment model is given to evaluate the effectiveness of the training program. A description of how the proposed model is being applied to the development of training programs for cybercrime investigators in developing countries will then be given, as well as already observed challenges. Finally, concluding remarks as well as proposed future work is discussed.

Research paper thumbnail of A Study on the Penalties for Possessing Child Pornography - Focused on Moral Panic Model

The possession of child pornography has become one of main issues because the investigations of c... more The possession of child pornography has become one of main issues because the investigations of child-sex offenders revealed that child-sex offenders stored lots of child pornography and watched them before or after they committed sex offenses against children. The Korean National Police Agency prosecuted 1,411 cases in 2012 and 2,654 cases in 2013 in child pornography crackdown. There have been differences of opinions on the penalties for possessing child pornography.
This research analyzed the penalties for possessing child pornography with moral panic model. We surveyed public perceptions on the penalties for possessing child pornography and investigators’ perceptions on the issue.
The results indicated that public insisted that the penalties for possessing child pornography should be strengthened while investigators reported that the current penalties for possessing child pornography are appropriate. While these findings contribute to our understanding of the penalties for possessing child pornography in Korea, further research is needed to develop more appropriate policies on child pornography.