• Title/Summary/Keyword: 불법 공유

Search Result 117, Processing Time 0.023 seconds

The Study Of Development Plan Based On The Analysis of the Import & Export Market In Korean Webtoon (한국웹툰의 수출입 시장분석을 통한 발전방안 연구)

  • Ryu, Yu-Hee;Lee, Seung-Jin
    • Cartoon and Animation Studies
    • /
    • s.42
    • /
    • pp.105-123
    • /
    • 2016
  • The webtoon market has been consisently developing in the digital market. Under such circumstances, The Korea webtoon market is rapidly growing and leading of them. This is the time to prepare the base of a stable environment for the webtoon market which shows a swift rise. The Korean webtoon is surely aiming at the global market as well as the domestic one. As the Korean webtoon companies spread out to the world briskly, The leading publication cartoon market, Japan tries to break into the Korean digital market. The domestic market that has the good-quality cartoons through exportation and importation to make people of all ages enjoy them. and also the Korean webtoon is in the center of the global webtoon markert. The early model of Korean webtoon, line-webtoon is translated in English, Chinese, Thai language and Indonesian language to use on the mobile applications and web. Nevertheless, It is just the stating point. With Eradicating of the Achilles heel of the digital contents, illegal distribution and finding materials for cultural discount rate minimized cartoon, The Korean webtoon can become the highest in the global market and hold it. Moreover, not only webtoon but also published cartoons are existing together to have a long run. Beyond the existing cartoon books printed on paper, we should reach toward the digital books with portability and economic feasibility to make the contents stay out longer.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

A KCDSA Magic Ink Sinature Secret Sharing Method (분배된 비밀 공유 기법을 이용한 KCDSA 매직 잉크 서명 방식)

  • 류영규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.13-24
    • /
    • 1999
  • Electronic cash is a digital signature issued by bank. If the concept of the distributed secret sharing and magic ink signature is introduced in the existing electronic cash system we can increase the security level and the availability of electronic cash system and trace the electronic cash itself and the owner of electronic cash which was issued anonymously to a user in case of illegal usage of electronic cash by users. If the trust is concentrated on one bank system. the problem of misuse of bank can be occurred. To solve this problem, the distributed secrete sharing scheme need to be introduced in electronic cash system. In this paper We propose a DSS(Digital Signature Standard) distributed magic ink signature scheme and a KCDSA(Korea Certificate-based Digital Signature Algorithm) distributed magic ink signature scheme using a verifiable secret sharing method. and we compare two methods with respect to the required computation amount for the generation of magic-ink signature.

Analysis of Elderly Pedestrian Traffic Accident Data and Suggestions (노인 보행자 교통사고원인 분석 및 대책)

  • Ji, Osok
    • 한국노년학
    • /
    • v.30 no.3
    • /
    • pp.843-853
    • /
    • 2010
  • The purpose of this study is to find out the characteristics of elderly pedestrian accidents and to suggest policy implications to enhance the level of elderly pedestrian safety. Although much efforts has made to enhance traffic safety environment, pedestrian traffic accidents among elderly population are not significantly decreased. This is mainly because current traffic safety measures do not much consider the characteristics of elderly pedestrians in the aspects of physical and psychological conditions. Main findings from vehicle-pedestrian traffic accident data and survey are as follows. First elderly pedestrians have high probability of traffic accident near crosswalks or cross streets rather than on crosswalk or cross streets. Second they need more green light time for crossing the streets. Third, they feel motor cycles running on the side walk and parked vehicles on the side walk are the most dangerous factors. Forth, general drivers do not have reasonable understanding for the walking behaviors of elderly pedestrians. Fifth, elderly pedestrians frequently need to rest while walking. Sixth, elderly people do not see clearly or understand traffic signs. Finally, many elderly pedestrians experience accidents or inconvenience while walking on the sidewalk.

Insurance system for legal settlement of drone accidents (드론사고의 법적 구제에 관한 보험제도)

  • Kim, Sun-Ihee;Kwon, Min-Hee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.1
    • /
    • pp.227-260
    • /
    • 2018
  • Recently, as the use of drones increases, the risk of drone accidents and third-party property damage is also increasing. In Korea, due to the recent increase in drone use, accidents have been frequently reported in the media. The number of reports from citizens, and military and police calls regarding illegal or inappropriate drone use has also been increasing. Drone operators may be responsible for paying damages to third parties due to drone accidents, and are liable for paying settlements due to illegal video recording. Therefore, it is necessary to study the idea of providing drone insurance, which can mitigate the liability and risk caused by drone accidents. In the US, comprehensive housing insurance covers damages caused by recreational drones around the property. In the UK, when a drone accident occurs, the drone owner or operator bears strict liability. Also, in the UK, drone insurance joining obligation depends on the weight of the drones and their intended use. In Germany, in the event of personal or material damage, drone owner bears strict liability as long as their drone is registered as an aircraft. Germany also requires by law that all drone owners carry liability insurance. In Korea, insurance is required only for "ultra-light aircraft use businesses, airplane rental companies and leisure sports businesses," where the aircraft is "paid for according to the demand of others." Therefore, it can be difficult to file claims for third party damages caused by unmanned aerial vehicles in personal use. Foreign insurance companies are selling drone insurance that covers a variety of damages that can occur during drone accidents. Some insurance companies in Korea also have developed and sell drone insurance. However, the premiums are very high. In addition, drone insurance that addresses specific problems related to drone accidents is also lacking. In order for drone insurance to be viable, it is first necessary to reduce the insurance premiums or rates. In order to trim the excess cost of drone insurance premiums, drone flight data should be accessible to the insurance company, possibly provided by the drone pilot project. Finally, in order to facilitate claims by third parties, it is necessary to study how to establish specific policy language that addresses drone weight, location, and flight frequency.

An Analysis of Economic and Psychological Factors on the Forest Protection of the Mountain People in Jeonbuk Province -On the Economic Psychological Status Associated with Structure in Forest Production- (산촌주민(山村住民) 산림보호(山林保護)에 대한 경제적(經濟的) 심리적요인(心理的要因) 분석(分析) -산림생산구조(山林生産構造)에 따르는 경제심리상(經濟心理狀)-)

  • Lee, Kwang Won;Kim, Jae Seng
    • Journal of Korean Society of Forest Science
    • /
    • v.36 no.1
    • /
    • pp.38-46
    • /
    • 1977
  • The purpose of this study are to analyze economic and psychological factors associated with the forest protection of the mountain people, and to explain the forms of the forest management by ownership classes, especially with forest in the production structure of the mountain villages, particulary from Aprial 1st to 20th in 1975. And the basis of the data for this study is to have been obtained by the sample of 462 households, in Jeonbuk province, which were selected by the method of Yandom sampling. In order to determine what relations there are between the forest ownership classes are independent and each of the selected economic and psychological factors, the chi-squre test was used. The findings may be summarized as follows; 1. The area per household forest land of the mountain villages farm families with forest was 1.4ha and are middle classes with the cultivated area, and manage their forest in favor of the forest fuel and the byproducts, which we call "Earn Ownership Management Form". As it is acomplished by the agricultural surplus labor, we can't expect the positive forest investments. 2. The expectation of the proceeds of forest investments seems to be high but 30% of them doubtful. And the mountain villages farm families with above 3ha forest area expect their forest investments to be positive and in future they have hope in the economic management from. 3. The mountainous mountain fram families reply to a small sums of capital and the control of after the fact on account of the negative factors of forest investment. But rural mountain villages farm famillies assist on spending too much money for the control and nexious insects damage. 4. The reason about illegal cut away was mainly their fuels problem and then most of moumtain farm villages was used to forest fuel in their fuel. But 57% of mountainous mountain villages farm families not having forest area, and 66% of them get their fual on the self-supply, and 66.9% of them get from public and nationat forest and other's forest. That is one of the big problems of the forest protection. 5. Above 66% of mountain people think that forest law is severe and 50% of mountainous mountain villages farm families think if usual. Especially ones not having forest area but taking advantage of forest among them think so. 6. Rural mountain villages farm families have comparatively positive attitude for protecting forest, but mountainous mountain villages farm families negative. Classes with above 3ha forest area have more outlook of forest protection. And the more such classes are, the better they can protect forest. 7. There are problem about operation and education of the forest law on the mountainous mountain villages farm families.

  • PDF