Browse > Article
http://dx.doi.org/10.15207/JKCS.2018.9.4.031

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research  

Lee, Jong-Sik (Department of Interaction Science, Sungkyunkwan University)
Publication Information
Journal of the Korea Convergence Society / v.9, no.4, 2018 , pp. 31-45 More about this Journal
Abstract
Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.
Keywords
IoT; Program protection; Fir Use; Software program copyright; program plagiarism;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 S. W. Cha. (2014). Big Data Protection of the environment and privacy. IT and Law Studies, 8, 193-259.
2 Y. S. Son & J. H. Park. (2015). Home IoT technology status and development direction. Journal of the Korean Institute of Communication Sciences (Information and Communication), 32(4), 23-28.
3 S. H. Lee & Y. Y. Cho. (2015). A Study on the Strengthening of National Cyber Security in the Internet Age. Political Information Research, 18 (2), 1-30.
4 H. S. Chang, H. J. Kim & T. S. Son. (2015). A Study on Cyber Security Issues in Industrial IoT Environment." Journal of information security 25.5: 12-17.
5 Y. L. Lee & J. S. Kim. (2014). Personal Information Protection Framework in IoT Environment. Korea Contents Association 2014 Fall Conference, 277-278.
6 S. S. Kim. (1996). Introduction to Computer Science, Hongneung Science Publishing.: 183-216.
7 Oracle America, Inc. v. Google Inc., 2014 WL 1855277 (Fed. Cir. May 9, 2014).
8 B. Y. Lee, J. T. Lim & J. S. Yoo. (2013). Utilization of social media analysis technique using big data. Journal of the Korea Contents Association, 13(2), 211-219.   DOI
9 Y. C. Kim, S. C. Hwang & J. Y. Choi. (2005). Program similarity evaluation algorithm. Journal of the Internet Information Science Society, 6(1), 51-64.
10 Y. E. Kim, Y. J. Lee & W. G.(2013). Program Plagiarism Checking Method by Class Structure Graph Comparison. Journal of the Korea Contents Association, 13(11), 37-47.   DOI
11 S. H. Lee & K. W. Shin. (2018). Area-efficient design of SHA-256 hash processors for IoT security. The Journal of the Korea Information and Communications Society, 22(1), 109-116.
12 H. E. Moon, J. Y, Sung, H. S. Lee, K .I, Jang, K. Y. Kwak & S. T. Woo. (2018). Detection of attack group using malware and packer detection. Journal of the Korean Institute of Information Scientists and Engineers, 45(2), 106-112.
13 H. S. Yang. (2017). A Study on the Security Quality Evaluation Method of Smart Healthcare System. Digital fusion research, 15(11), 251-259.
14 Y. C. Ahn, Y. H. Shin, G. H. Lee. (2015). A Study on the countermeasure against BLE based ZEP system attack technique using the fusion of Big Data platform and monitoring system. Digital fusion research, 13(8), 331-336.
15 & S.Y. Yuk.(2003) Patentability of computer programs. Comparative Judgment 1.2:481-511.
16 http://www.ddaily.co.kr/news/article.html?no=137711 Digital Daily, (2016)
17 Y. E. Kim, Y. J. Lee & W. G.2013). Program Plagiarism Checking Method by Class Structure Graph Comparison. Journal of the Korea Contents Association, 13 (11), 37-47.   DOI
18 C. Roy & J. Cordy. (2007). A Survey on Software Clone Detection Research, Technical Report 541, Queen's University at Kingston.
19 S. Narayanan & S. Simi. (2012). Source Code Plagiarism Detection and Performance Analysis Using Fingerprint Based Distance Measure Method. 2012 7th International Conference on Computer Science & Education, 1065-1068.
20 J. Ji, G. Woo & H. Cho. (2007). A Source Code Linearization Technique for Detecting Plagiarized Programs. ACM SIGCSE Bulletin 39(3),, 73-77.   DOI
21 C. Liu, C. Chen, J. Han, & P. Yu, (2006). GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis," Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, .872-881.
22 S. O. Yoon. (2013). A Study on Risk Classification of Big Data. Journal of the Korean Association of Local Information, 16(2), 93-122.
23 J. J. Kim. (1997). Computer General, Hong Jin Publishing Co., Ltd pp196
24 Supreme Court precedent 1996.08.23, 95DO2785
25 Supreme Court precedent 2001. 05. 15, 98DO732
26 Seoul High Court 1996.10.11, 96NA1353
27 Seoul case law support for East1998. 4.NA 13. Sentence 96KAHAP 1921 verdict
28 Seoul case law support for East 1997.11.28, 95GAHAP 11403
29 Supreme Court precedent 2002.06.28, 2001DO2900
30 Supreme Court precedent 2002.12.26, 2000DA.13757
31 Seoul District Court Copy 1997.01.10. 96NO7508 / Supreme Court 1997.07.22. 97DO764/Supreme Court 1997.05.30. 97DO766 /Supreme Court 1997.05.23. 97DO767 /Supreme Court 1997.06.13. 97DO768 Computer program protection law
32 Supreme Court precedent 1998.03.13, 97DA45259
33 Seoul High Court case 1999.04.07, 98. 23616
34 Supreme Court precedent 2000.11.10, 98DA60590
35 Seoul High Court case 1993.06.18, 92NA64646 / Seoul District Court 1993.04.22, 92GAHAP31298
36 J. Holler, V. Tsiatsis, C. Mulligan, S. Avesand, S. Karnouskos & D. Boyle. (2014). From Machineto- machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press.
37 J. E. Cohen & M. A. Lemley. (2001). Patent scope and innovation in the software industry. California Law Review, 1-57.
38 T. H. Goo. (2005). Technical Characteristics of Computer Programs and Patent and Copyright Protection. 13.
39 S. J. Oh & H. W. Lee. (2013). Copyright Law 3rd Edition, Park Young-sa, 873
40 J. Bessen & E. Maskin. (2009). Sequential innovation, patents, and imitation. The RAND Journal of Economics, 40(4), 611-635.   DOI
41 http://it.donga.com/23161/ITDONGHAS.WLee 2015.12.03.
42 D. H. Kim, S. W. Yoon & Y. P. Lee. (2013). Security or IoT services. Journal of the Korean Institute of Communication Sciences (Information and Communication), 30(8), 53-59.
43 J. H. Jeon, H. G. Hong, W. S. Lee & H. J. Kim. (2015). Open Source Things Internet (OSIoT) Trends and Forecasts. Journal of the Korean Institute of Communication Sciences (Information and Communication), 32 (5), 23-30.
44 H. S. Jang, H. J. Kim, & T. S. Son. (2015). A Study on Cyber Security Issues in Industrial IoT Environment. Journal of Information Security, 25(5), 12-17.
45 H. M. Lee & D. K. Shin. (2015). Open Software Platform Design for the Internet. Proceedings of the Korea Information Science Society Conference, 1492-1494.
46 H. K. Lee, M. H. Kim & H. C. Bang. (2014). Feature: Internet: Things Internet technology trends and development direction. Journal of Korea Institute of Information Scientists and Engineers 21-2: 14-21.
47 Y. G. Hong, M. K Shin & H. J. Kim. (2013). Standardization trend of internet (IoT / M2M). OSIA Standards & Technology Review, 26 (2), 8-17.
48 J. H. Seo, Y. S. Min & Y K. Park. (2015). Technical analysis for software protection. Journal of Information Technology, 13(1), 33-39.
49 S. M. You. (2015). Government Policy Direction for Software Copyright Protection. Journal of Information Technology, 13(1), 41-47.
50 J. S, Lee, S. K. Chang & I. H. Cho. (2014). Hardware based security for Internet of Things (IoT) security. Proceedings of the Fall Conference of the Korean Society for Internet Information, 241-242.
51 J. S. Choi & H. W. Kim. (2013). IoT security technology trend.
52 ITU Internet Reports. (2005). Internet of Things, ITU
53 ITU-T Y.2060, (2012). Overview of the Internet of Things.
54 N. J. Park & G. J. Ahn. (2010). Privacy Protection in Smart Grid. Journal of information security, 20(3), 62-78.
55 C. S. Pyo, H, Y. Yong, N. S. Kim & H. C. Bang. (2013). IoT(M2M) Technology Trends and Prospects. Journal of the Korean Institute of Communication Sciences (Information and Communication), 30(8), 3-10.
56 BILL WEINBERG, Open Source and the Internet of Things: Roles, Reach and Rationale for Deploying OSS, http://rtcmagazine.com/articles/view/105734
57 B. I. Kim. (2009). Open source license violations and copyright infringement. Quarterly copyright.
58 H. R. Reddy. (2009). Jacobsen v. Katzer: the Federal Circuit weighs in on the enforceability of free and open source software licenses. Berkeley Tech. LJ, 24, 299.
59 Y. C. Kim, S. C. Hwang & J. Y. Choi. (2005). Program similarity evaluation algorithm." Journal of the Internet Information Science Society. 51-64.
60 H. J. Seo, D. K. Kim, J. H. Kim, J. S. Choi & H. W. Kim. (2014). Feature: Internet of Things: Security and Privacy Protection on the Internet. Journal of Information Processing, 21(2), 48-60.
61 A. Wright. (2009). Cyber security for the power grid: cyber security issues & Securing control systems, ACM CCS.
62 J. S. Choi & H. W. Kim. (2013). IoT security technology trend. Table 1, 2814