Jake Jang - Academia.edu (original) (raw)
Papers by Jake Jang
Journal of Digital Forensics, 2019
2018 28th EAEEIE Annual Conference (EAEEIE), 2018
The university attempts to meet two basic needs for society: education and research. In most case... more The university attempts to meet two basic needs for society: education and research. In most cases these roles are separated. Undergraduate (Bachelor) and graduate (Masters) students are focused more on education while the research is designated for post-graduate students. This paper shows how education and research can be interconnected through students' engagement in research carried out at the university. Such activity can be funded by various national, EU and non-EU grants that support international partnership and encourage universities to improve student competencies through student research. The paper discusses the gap between research and education in the universities, and provides a case study showing how this issue can be tackled using student research teams participating in scientific projects. The study is demonstrated with the joint IoT research project realized by two universities in the Czech Republic and South Korea from 2016 to 2018.
The Journal of the Korea Contents Association, 2017
This study is aimed at observing effects of fingerprint image quality on various photographing co... more This study is aimed at observing effects of fingerprint image quality on various photographing conditions in the aspect of resolution. Discrimination between two friction ridges plays an important role in the value of fingerprint image, and it can be confirmed with quantification of pixels of boundary region which is existing between two friction ridges. In this study, several factors were estimated with same fingerprint image using Adobe photoshop CS 6 for analysis: changes of image quality by ISO, movement when photographing, and photographers' experience and skill. Consequently, there was no significant change of image quality by ISO. Furthermore, there was no significant difference in the hand-held images between crime scene investigators and laymen, yet there was significant difference between hand-held images and images using tripod in the aspect of resolution. This study shows that using tripod is very important in forensic fingerprint photography through empirical method...
The Journal of the Institute of Webcasting, Internet and Telecommunication, 2014
An area presenting new opportunities for both legitimate business, as well as criminal organizati... more An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.
Digital Investigation, 2018
Many data breaches happened due to poor implementation or complete absence of security controls i... more Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations.
The Journal of the Institute of Internet Broadcasting and Communication, 2017
Many systems rely on reliable timestamps to determine the time of a particular action or event. T... more Many systems rely on reliable timestamps to determine the time of a particular action or event. This is especially true in digital investigations where investigators are attempting to determine when a suspect actually committed an action. The challenge, however, is that objects are not updated at the exact moment that an event occurs, but within some time-span after the actual event. In this work we define a simple model of digital systems with objects that have associated timestamps. The model is used to predict object update patterns for objects with associated timestamps, and make predictions about these update time-spans. Through empirical studies of digital systems, we show that timestamp update patterns are not instantaneous. We then provide a method for calculating the distribution of timestamp updates on a particular system to determine more accurate action instance times.
The Journal of the Institute of Internet Broadcasting and Communication, 2016
The Journal of the Korea Contents Association, 2014
It is impossible to use general latent fingerprint developing reagents with thermal paper because... more It is impossible to use general latent fingerprint developing reagents with thermal paper because it is very sensitive to change its color when exposed to heat and polarized solvents. The present study set up the applicapable ratio of 1,2-Indanedione solution demonstrating the effect of zinc chloride. There is no difference in results and the term of validity in solution containing under 3% of polarized solvent. And the solution without zinc chloride has better result in fluorescence.
Lecture Notes in Electrical Engineering, 2014
This work proposes a method for the measurement of a country's digital investigation capacity and... more This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing with digital crime, target international partners should be a consideration in expansion, and could potentially be a bottleneck of investigation requests.
arXiv (Cornell University), Jun 29, 2013
Digital technologies are constantly changing, and with it criminals are finding new ways to abuse... more Digital technologies are constantly changing, and with it criminals are finding new ways to abuse these technologies. Cybercrime investigators, then, must also keep their skills and knowledge up to date. This work proposes a holistic training development model-specifically focused on cybercrime investigation-that is based on improving investigator capability while also considering the capacity of the investigator or unit. Along with a training development model, a cybercrime investigation capacity assessment framework is given for attempting to measure capacity throughout the education process. First, a training development model is proposed that focuses on the expansion of investigation capability as well as capacity of investigators and units. Next, a capacity assessment model is given to evaluate the effectiveness of the training program. A description of how the proposed model is being applied to the development of training programs for cybercrime investigators in developing countries will then be given, as well as already observed challenges. Finally, concluding remarks as well as proposed future work is discussed.
The possession of child pornography has become one of main issues because the investigations of c... more The possession of child pornography has become one of main issues because the investigations of child-sex offenders revealed that child-sex offenders stored lots of child pornography and watched them before or after they committed sex offenses against children. The Korean National Police Agency prosecuted 1,411 cases in 2012 and 2,654 cases in 2013 in child pornography crackdown. There have been differences of opinions on the penalties for possessing child pornography.
This research analyzed the penalties for possessing child pornography with moral panic model. We surveyed public perceptions on the penalties for possessing child pornography and investigators’ perceptions on the issue.
The results indicated that public insisted that the penalties for possessing child pornography should be strengthened while investigators reported that the current penalties for possessing child pornography are appropriate. While these findings contribute to our understanding of the penalties for possessing child pornography in Korea, further research is needed to develop more appropriate policies on child pornography.
Journal of Digital Forensics, 2019
2018 28th EAEEIE Annual Conference (EAEEIE), 2018
The university attempts to meet two basic needs for society: education and research. In most case... more The university attempts to meet two basic needs for society: education and research. In most cases these roles are separated. Undergraduate (Bachelor) and graduate (Masters) students are focused more on education while the research is designated for post-graduate students. This paper shows how education and research can be interconnected through students' engagement in research carried out at the university. Such activity can be funded by various national, EU and non-EU grants that support international partnership and encourage universities to improve student competencies through student research. The paper discusses the gap between research and education in the universities, and provides a case study showing how this issue can be tackled using student research teams participating in scientific projects. The study is demonstrated with the joint IoT research project realized by two universities in the Czech Republic and South Korea from 2016 to 2018.
The Journal of the Korea Contents Association, 2017
This study is aimed at observing effects of fingerprint image quality on various photographing co... more This study is aimed at observing effects of fingerprint image quality on various photographing conditions in the aspect of resolution. Discrimination between two friction ridges plays an important role in the value of fingerprint image, and it can be confirmed with quantification of pixels of boundary region which is existing between two friction ridges. In this study, several factors were estimated with same fingerprint image using Adobe photoshop CS 6 for analysis: changes of image quality by ISO, movement when photographing, and photographers' experience and skill. Consequently, there was no significant change of image quality by ISO. Furthermore, there was no significant difference in the hand-held images between crime scene investigators and laymen, yet there was significant difference between hand-held images and images using tripod in the aspect of resolution. This study shows that using tripod is very important in forensic fingerprint photography through empirical method...
The Journal of the Institute of Webcasting, Internet and Telecommunication, 2014
An area presenting new opportunities for both legitimate business, as well as criminal organizati... more An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.
Digital Investigation, 2018
Many data breaches happened due to poor implementation or complete absence of security controls i... more Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations.
The Journal of the Institute of Internet Broadcasting and Communication, 2017
Many systems rely on reliable timestamps to determine the time of a particular action or event. T... more Many systems rely on reliable timestamps to determine the time of a particular action or event. This is especially true in digital investigations where investigators are attempting to determine when a suspect actually committed an action. The challenge, however, is that objects are not updated at the exact moment that an event occurs, but within some time-span after the actual event. In this work we define a simple model of digital systems with objects that have associated timestamps. The model is used to predict object update patterns for objects with associated timestamps, and make predictions about these update time-spans. Through empirical studies of digital systems, we show that timestamp update patterns are not instantaneous. We then provide a method for calculating the distribution of timestamp updates on a particular system to determine more accurate action instance times.
The Journal of the Institute of Internet Broadcasting and Communication, 2016
The Journal of the Korea Contents Association, 2014
It is impossible to use general latent fingerprint developing reagents with thermal paper because... more It is impossible to use general latent fingerprint developing reagents with thermal paper because it is very sensitive to change its color when exposed to heat and polarized solvents. The present study set up the applicapable ratio of 1,2-Indanedione solution demonstrating the effect of zinc chloride. There is no difference in results and the term of validity in solution containing under 3% of polarized solvent. And the solution without zinc chloride has better result in fluorescence.
Lecture Notes in Electrical Engineering, 2014
This work proposes a method for the measurement of a country's digital investigation capacity and... more This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing with digital crime, target international partners should be a consideration in expansion, and could potentially be a bottleneck of investigation requests.
arXiv (Cornell University), Jun 29, 2013
Digital technologies are constantly changing, and with it criminals are finding new ways to abuse... more Digital technologies are constantly changing, and with it criminals are finding new ways to abuse these technologies. Cybercrime investigators, then, must also keep their skills and knowledge up to date. This work proposes a holistic training development model-specifically focused on cybercrime investigation-that is based on improving investigator capability while also considering the capacity of the investigator or unit. Along with a training development model, a cybercrime investigation capacity assessment framework is given for attempting to measure capacity throughout the education process. First, a training development model is proposed that focuses on the expansion of investigation capability as well as capacity of investigators and units. Next, a capacity assessment model is given to evaluate the effectiveness of the training program. A description of how the proposed model is being applied to the development of training programs for cybercrime investigators in developing countries will then be given, as well as already observed challenges. Finally, concluding remarks as well as proposed future work is discussed.
The possession of child pornography has become one of main issues because the investigations of c... more The possession of child pornography has become one of main issues because the investigations of child-sex offenders revealed that child-sex offenders stored lots of child pornography and watched them before or after they committed sex offenses against children. The Korean National Police Agency prosecuted 1,411 cases in 2012 and 2,654 cases in 2013 in child pornography crackdown. There have been differences of opinions on the penalties for possessing child pornography.
This research analyzed the penalties for possessing child pornography with moral panic model. We surveyed public perceptions on the penalties for possessing child pornography and investigators’ perceptions on the issue.
The results indicated that public insisted that the penalties for possessing child pornography should be strengthened while investigators reported that the current penalties for possessing child pornography are appropriate. While these findings contribute to our understanding of the penalties for possessing child pornography in Korea, further research is needed to develop more appropriate policies on child pornography.