• Title/Summary/Keyword: 복제본

Search Result 1,123, Processing Time 0.023 seconds

A Comparative Analysis of the Library Exceptions in Copyright Laws in Major Countries (주요국 저작권법의 도서관 예외 규정 비교 분석)

  • Joung, Kyounghee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.1
    • /
    • pp.263-289
    • /
    • 2017
  • The purpose of this study is to enhance the understanding of the provisions for library exceptions in copyright laws and to suggest the direction for the revision of provision in the Copyright Act of Korea. This study compares and analyzes the provisions for library exceptions in several countries' copyright law including Korea, Japan, UK, Australia and USA. This study found that the most common issues in library exception provisions are providing reproduction for users, reproduction for preservation, reproduction for interlibrary loan and digitization of library collections but the conditions for each issue are quite different. The suggestions for the revision of the library exceptions in the Copyright Act of Korea are as follows: changing the amount of reproduction of unpublished works, of works which cannot be obtained at a fair price and of periodicals for users, the transmitting digital reproduction to the user under limited conditions, preparing conditions for reproduction for preservation in libraries, preparing the applicable provisions for reproductions for interlibrary loans and for the limitation of works to be digitized and extending their use at the same time.

Data Access Frequency based Data Replication Method using Erasure Codes in Cloud Storage System (클라우드 스토리지 시스템에서 데이터 접근빈도와 Erasure Codes를 이용한 데이터 복제 기법)

  • Kim, Ju-Kyeong;Kim, Deok-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.85-91
    • /
    • 2014
  • Cloud storage system uses a distributed file system for storing and managing data. Traditional distributed file system makes a triplication of data in order to restore data loss in disk failure. However, enforcing data replication method increases storage utilization and causes extra I/O operations during replication process. In this paper, we propose a data replication method using erasure codes in cloud storage system to improve storage space efficiency and I/O performance. In particular, according to data access frequency, the proposed method can reduce the number of data replications but using erasure codes can keep the same data recovery performance. Experimental results show that proposed method improves performance in storage efficiency 40%, read throughput 11%, write throughput 10% better than HDFS does.

Integrative Analysis on Digital Piracy: Focused on Attitude, Personal Norm, and Habit (디지털 콘텐츠 불법복제 행동에 대한 통합적 분석: 태도, 개인규범, 습관을 중심으로)

  • Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.85-109
    • /
    • 2018
  • The rapid development of information and communication technology has made it for people to pirate digital contents easily and quickly. Although many studies have investigated the underlying factors that lead to an individual engaging in digital piracy, few studies have provided holistic and integrative view on this issue. Therefore, this study attempts to build integrative research model based on theory of planned behavior (TPB), norm activation model (NAM), and habit. For this purpose, this study develops nine hypotheses that explain the relationship between attitude, personal norm, habit, and behavioral intention, and tests them with survey data collected from 337 participants. The results of this study show that attitude, perceived behavioral control, personal norm, and habit have impact on behavioral intention of digital piracy while subjective norm does not affect behavioral intention. This study contributes to expand existing studies by identifying the relationship between attitude, personal norm, habit and behavioral intention.

A Dynamic Analysis of Digital Piracy, Ratings, and Online Buzz for Korean TV Dramas (국내 TV 드라마 디지털 불법복제, TV 시청률, 온라인 입소문 간의 동태적 분석)

  • Kim, Dongyeon;Park, Kyuhong;Bang, Youngsok
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.3
    • /
    • pp.1-22
    • /
    • 2022
  • We investigate the dynamic relationships among digital piracy activities, TV ratings, and online buzz for Korean TV dramas using a panel vector autoregression model. Our main findings include 1) TV ratings are negatively affected by digital piracy activities but positively affected by google buzz, 2) digital piracy activities are negatively affected by TV ratings and social buzz, and 3) social buzz and google buzz are positively influenced by each other. While many empirical studies were conducted to reveal the effects of music or movie piracy, our understanding of drama piracy is limited. We provide empirical evidence of the dynamic relationships between drama piracy, TV ratings, and online buzz. Our findings show the presence of indirect piracy effects on TV ratings through online buzz. Further, we reveal that social buzz and google trends play different roles in promoting TV ratings and piracy activities. We discuss the implications of our findings for theory and practitioners.

A Study on Effects of Relative Benefits and Costs of Piracy of Digital Contents on Attitudes and Behaviors of Illegal Duplication (디지털콘텐츠 불법복제의 상대적 편익과 비용이 불법복제태도 및 행동에 미치는 영향)

  • Park, Kyung-Ja
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.489-499
    • /
    • 2015
  • The purpose of this study is to identify factors affecting piracy of online digital contents, focusing on relative awareness of illegal duplications, compared to legal duplication. To do this, the current study integrates factors proposed in existing literature and the previous studies based on the theory of planned behavior and accesses them from cost-benefit point of view. Main findings are summarized as followed;- First, with regard to relative benefits gained by illegal duplication, it is shown that monetary and psychological utility have positive effects on attitudes and behaviors of illegal duplication. Particularly, it is found that monetary incentive is the main cause of illegal duplication as monetary gains are major factors affecting illegal duplication behaviors. Second, it is suggested that ethical cost is a definitive factor that has negative effects on illegal duplication behaviors while technological cost has also significant effects on illegal duplication behaviors. Third, it is confirmed that there is a significant relationship between attitudes and behaviors of illegal duplication. This result shows that an attitude to illegal duplication is antecedent of behaviors as the belief and the value regarding illegal duplication can lead actual behaviors.

Level of User Awareness for Illegal Downloading of Movie Content (영상 컨텐츠 불법 복제에 관한 사용자 의식 수준)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.212-224
    • /
    • 2009
  • Proliferation of high performance internet infrastructures finally allows their users download a single copy of regular movie just within in a couple of seconds. Ease of accesses to the software for downloading consequently leads them insensitive to the ethics or legitimacy of their conduct. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Whilst the level of awareness is addressed even in a far-fetched manner in the area of music piracy and computer software piracy, the case of movie is much different in that we even fail to find any survey that has been made for movie piracy. The survey has been made by devising questionnaires for netizens and it was posted web WorldSurvey, which is the most prominent online survey site in Korea. To our surprise, 9 out of 10 respondents expressed they actually resort to illegal downloading for the reason of convenience. We realized one more surprise. More than 95% of netizens conspicuously aware of their downloading behaviors are mischievous and illegal without reservation.

Availability-based Server Redirection System for Effective Content Delivery on Web (웹상에서의 효과적인 콘텐츠 전송을 위한 가용율 기반의 서버 재설정 시스템)

  • Song, Seung-Hyeon;Jang, Sung-Ho;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.61-71
    • /
    • 2009
  • The server redirection system replicates contents on replica servers in the distributed network environment. When users make a request for contents, the system can provide the contents much faster than the client-server network system. In the server redirection system, it is the most important to select the optimal replica server with user's information because many replica servers are geographically distributed. And, the system can serve contents to users flexibly if a redirector is well constructed. In this paper, the redirector makes a list of candidates suitable for user conditions by the decision tree method and calculates the availability of each replica server. And, the redirector selects the replica server with the highest availability. This paper also proposes an availability-based server redirection system that predicts the availability of each replica server in order to reduce the workload of replica servers and the repetitive communication messages between a redirector and replica servers. If a user accesses the network path for the replica server selected and noticed by the proposed system, the user can get contents effectively and efficiently.

Data Replication Technique for Improving Data Locality of MapReduce (맵리듀스의 데이터 로컬리티 향상을 위한 데이터 복제기법)

  • Lee, Jung-Ha;Yu, Heon-Chang;Lee, Eun-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.218-220
    • /
    • 2012
  • 인터넷 활용과 웹 어플리케이션의 개발이 증가함에 따라 처리해야하는 데이터의 양도 또한 증가하고 있다. 대량의 데이터를 효과적으로 처리하기 위한 방법 중 하나로 병렬처리 프로그래밍 모델인 맵리듀스가 있다. 하둡은 맵리듀스의 오픈소스 구현으로 대량의 데이터를 병렬로 처리하는 무료 자바 소프트웨어 프레임워크이다. 분산 파일 시스템을 사용하는 하둡에서는 처리하는 데이터가 다른 노드에 위치하는 데이터 로컬리티 문제가 전체 작업 수행시간의 증가를 야기하는 문제가 있다. 본 논문에서는 하둡에서의 데이터 로컬리티 문제를 해결하기 위한 데이터 복제기법을 제안한다. 제안하는 데이터 복제기법에서는 1) 라그랑지 보간법을 사용하여 과거 접근수를 이용한 미래 접근수를 예측하고, 2) 예측된 값을 Threshold값으로 설정하고, 3) 데이터 로컬리티 문제가 발생하였을 때, 복제사본을 생성할 것인지 캐시를 생성할 것인지를 결정하여 복제 사본의 수를 최적화 한다. 실험을 통해 단순히 복제사본 수를 증가시킴으로써 데이터 로컬리티를 향상을 이루어도 작업 완료시간이 감소하는 것이 아니라는 결과를 볼 수 있었고, 오버 런치로 인한 작업 완료시간 증가를 줄이기 위해 데이터 복제사본 수 최적화의 필요성을 확인할 수 있었다.

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Weighted Competitive Update Protocol for DSM Systems (DSM 시스템에서 통신 부하의 가중치를 고려한 경쟁적인 갱신 프로토콜)

  • Im, Seong-Hwa;Baek, Sang-Hyeon;Kim, Jae-Hun;Kim, Seong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2245-2252
    • /
    • 1999
  • Since DSM provides a user a simple shared memory abstraction, the user does not have to be concerned with data movement between hosts. Each node in DSM systems has processor, memory, and connection to a network. Memory is divided into pages, and a page can have multiple copies in different nodes. To maintain data consistency between nodes, two conventional protocols are used : write-update protocol and invalidate protocol. The performance of these protocols depends on the system parameters and the memory access patterns. for adapting to memory access patterns, competitive update protocol updates those copies of a page that are expected to be used in the near future, while selectively invalidating other copies. We present weighted competitive update protocols that consider different communication bandwidth for each connection a of two nodes. Test result by simulation show that the weighted competitive update protocol improves performance.

  • PDF