• Title/Summary/Keyword: 소프트웨어 분쟁

Search Result 42, Processing Time 0.023 seconds

The Survey and the Proposal of Inspection Method for Illegal Program Reproduction (프로그램 불법 복제 감정에 대한 고찰 및 발전방안의 제시)

  • 조동욱;한길성;전병태
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1439-1444
    • /
    • 2001
  • Inspection of program products illegal reproduction is a significant field in deciding illegal recopy of program duplication, reproduction, plagiarization and electronic information by expertized programmer or specialist using computer science knowledge and technical methods. This is important for propelling the S/W industry in the high value creating industry. In particular, social demands are increasing the conflicts of the program products illegal recopy because of knowledge property problems. Therefore, legal and structural methods have been inspection of the program products illegal copy and usage. This article describes the existing problems of the inspecting of the program products illegal recopy and discusses the future directions and developing methods for propelling and setting the knowledge property industry field such as S/W industry.

  • PDF

A Study on Relationship between Function Points and Development Factors in Projects (기능점수와 프로젝트 개발요소간 상호관계에 관한 연구)

  • Lee, Won-Ho
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.262-268
    • /
    • 2002
  • 일반산업 분야의 프로젝트에 비해 소프트웨어 개발 분야에서의 프로젝트는 그 자체 특성상 가시적이고 계량적으로 평가하기 어려웠고 이로 인해 그 동안 국내 업계 및 정부기관에서는 프로젝트 규모 및 비용 산정에 있어서 많은 어려움이 있었다. 다행히도 최근 국제적으로 소프트웨어 프로젝트 측정기준으로 자리잡고 있는 기능점수에 관해서 국내 학계 및 업계에서도 관심을 가지게 되었고 관련된 연구결과도 계속 나오고 있다. 또한, 정부기관을 비롯하여 업계에서도 이러한 연구 결과를 기반으로 소프트웨어 개발비, 유지보수 및 재 개발비의 산정 기준으로 기능점수를 활용하려는 시도가 이루어지고 있다. 이러한 기능점수의 산정에 있어서 프로젝트의 주요 개발 요소인 하드웨어 플랫폼, 개발언어 유형, 대상업무 유형, 개발 납기 등에 따라 보정계수가 다르게 적용되고 있다. 그러나 아직 국내에서는 기능점수로 프로젝트 비용을 산정하기 위한 공감대 및 신뢰도에 대한 확산이 안된 상태이고 이에 따른 분쟁의 소지도 여전히 가지고 있다. 이러한 시점에서 본 논문은 ISBSG(International Software Benchmarking Standards Group)에서 제공하는 그 동안 축적된 해외 프로젝트 개발 결과 데이터를 기초로 기능점수와 프로젝트 개발에 투입되는 주요 개발요소간 관련성 및 프로젝트 개발 요소간의 상관관계를 분석 및 검증하여, 프로젝트 내에서의 기능점수와 관련된 개발요소간의 관련 정도에 대한 통계적 근거를 제시하여 향후 기능점수와 관련해서 이와 유사한 국내 프로젝트 수행 시 벤치마킹 자료로 활용하는데 그 목적이 있다.

  • PDF

Enhancing the performance of code-clone detection tools using code2vec (code2vec을 이용한 유사도 감정 도구의 성능 개선)

  • Um, Taeho;Hong, Sung Moon;Yang, Joon Hyuk;Jang, Hyo Seok;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.31-40
    • /
    • 2021
  • Plagiarism refers to the act of using the original data as if it were one's own without revealing the source. The plagiarism of source code causes a variety of problems, including legal disputes. Plagiarism in software projects is usually determined by measuring similarity by comparing every pair of source code within two projects. However, blindly comparing every pair has been a huge computational burden, causing a major factor of not using tools of better accuracy. If we can only compare pairs that are probable to be clones, eliminating pairs that are impossible to be clones, we can concentrate more on improving the accuracy of detection. In this paper, we propose a method of selecting highly probable candidates of clone pairs by pre-classifying suspected source-codes using a machine-learning model called code2vec.

A Study on the Need for Separation of Software Completeness Appraisal and Software Ready-made Appraisal (소프트웨어 완성도 감정과 기성고 감정 분리 필요성에 대한 고찰)

  • Kim, DoWan
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.11-17
    • /
    • 2021
  • In this study, problems of software completeness appraisal are pointed out and their solutions are presented by analyzing appraisal cases and judicial precedents. Completeness appraisal, ready-made appraisal, defect appraisal, and cost appraisal have been classified as and have been evaluated with extant software completeness appraisals. From a legal point of view, and in judicial precedents, however, there is a big difference between the definition of completeness and the completion rate. This is because the degree of completeness is evaluated under the premise that the software's development is complete, whereas the ready-made appraisal inspects the development progress of unfinished software. Often, in cases involving software completion rate, the total completion level is calculated by weighting each step of the software development process. However, completeness evaluations use the software's realization-operation as its sole criterion. In addition, another issue not addressed in existing software completeness appraisal cases is that there is no mention of who is responsible for software defects, whereas in case law, the responsible party is determined by finding who caused the dispute. In this paper, we systematically classify these problems, and present a novel evaluation method that separates software completeness evaluations from software completion evaluations.

Appraisal Method for Similarity of Large File Transfer Software (대용량 파일 전송 소프트웨어의 동일성 감정 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.11-16
    • /
    • 2021
  • The importance of software is increasing due to the development of information and communication, and software copyright disputes are also increasing. In this paper, the source of the submitted programs and the files necessary for the execution of the program were taken as the scope of analysis. The large-capacity file transfer solution program to be analyzed provides additional functions such as confidentiality, integrity, user authentication, and non-repudiation functions through digital signature and encryption of data.In this paper, we analyze the program A, program B, and the program C. In order to calculate the program similarity rate, the following contents are analyzed. Analyze the similarity of the package structure, package name, source file name in each package, variable name in source file, function name, function implementation source code, and product environment variable information. It also calculates the overall similarity rate of the program. In order to check the degree of agreement between the package structure and the package name, the similarity was determined by comparing the folder structure. It also analyzes the extent to which the package structure and package name match and the extent to which the source file (class) name within each package matches.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Object Material Confirmation for Source Code Comparison on Embedded System (임베디드 시스템의 동일기능 소스코드 유사도 분석 요구사항)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2021
  • In case of evaluating the similarity of the source code analysis material in the embedded system, the provided source code must be confirmed to be executable. However, it is currently being in which compilation and interface matching with hardware are provided in an unconfirmed materials. The complainant assumes that many parts of the source code are similar because the characteristics of the operation are similar and the expression of the function is similar. As for the analysis result, the analysis result may appear different than expected due to these unidentified objects. In this study, the improvement direction is sugested through the case study by the analysis process of the source code and the similarity of the unverified source code.

Meaning and Computation of Completeness and Payment in SW Appraisal (SW감정에서 완성도와 기성고의 의미 및 산출 방법)

  • Yun, Young-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.35-42
    • /
    • 2019
  • In this study, we reviewed the definition of completeness and payment in SW appraisal along to being complicated requirements of the appraisal, and we also presented their meaning and computation method. The completeness in SW appraisals means the degree of functional completion of the final product, and the payment refers cost spent to develop the product. Therefore, the completeness is evaluated based on the functions or interfaces of the final product, while the payment is calculated on the outputs or expenses of development steps. Recently, SW appraisal is complicated and the requirements for completeness and payment are changing. In this paper, we review the meanings and objectives of completeness and payment and present the evaluation methods for those.

M&V(측정 및 평가) 시행 방안에 대하여 ESCOs에게 물었다

  • 에너지절약전문기업협회
    • The Magazine for Energy Service Companies
    • /
    • s.26
    • /
    • pp.62-66
    • /
    • 2004
  • 전미ESCO협회는 현재 미국 내에서 ESCO에 의해 사용되고 있는 M&V방식에 대해 질의하였다. 오늘날 측정평가(M&V)에 있어서 가장 기본적인 방법은 에너지 결정 변수 중의 하나가 측정되는 또는 어쩌면 하나도 측정되지 않는 ''A형 옵션''일 것이다. 이러한 프로젝트에서 절약 보증을 결정하는 데는 사전 설치분석법이 사용되고 있다. 그러나 요구 절감 가치에 대한 분쟁이 발생하는 상황에서 ''A형 옵션''은 상황을 ''조용히'' 해결하는 데 불충분한 정보를 제공할 수 있다. 계약에 충실히 따르는 인기있는 접근법은 설비별 계산서 분석 소프트웨어를 사용하여 건물 전체의 에너지를 분석하는 ''C형 옵션''이다. M&V를 단순화하는 이유는 조명프로젝트의 절약에 대한 이해가 클수록, 신규 설비 위주 프로젝트를 선호하는 고객과 에너지절감 위주 프로젝트를 선호하는 고객간의 대립으로 인한 M&V를 실행하는 비용과 위험성을 감안한 듯 하다.

  • PDF

Digital Watermarking using Redundant Biorthogonal Wavelet Transform (중복성을 갖는 쌍직교 웨이블릿 변환을 이용한 디지털 워터마킹)

  • Choe, Chi-Won;Lee, Hae-Seong;Byeon, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.262-271
    • /
    • 2001
  • 디지털 컨텐츠의 저작권 보호와 위변조 탐지를 위해 사용되는 비가시적인 워터마킹 기법은 워터마킹된 영상의 화질저하를 최소로 하면서 화질이 현격히 저하되기 전에는 워터마크가 제거되지 않는 견고성을 갖도록 해야한다. 본 논문에서는 워커마킹된 영상에서 원영상을 사용하지 않고 저작권자를 탐지할 수 있는 디지털 워터마킹 기법을 제안한다. 제안된 기법은 크게 내장단계와 탐지단계로 나뉜다. 내장단계에서는 워터마킹된 영상의 화질이 크게 저하되지 않도록 시각적 마스킹 효과를 고려한다. 워터마크 탐지과정은 원 영상을 사용하지 않고 저작권 분쟁이 발생한 영상과 저작권 주장하는 사람이 제시한 해당 워터마크만을 사용하여 이루어진다. 본 논문에서 제안된 디지털 워터마킹 방법은 일반적인 영상의 변형에 상당히 견고한 특성을 가지며, 변형이 가해지지 않은 워터마킹된 영상을 저작자가 보관함으로써 다중 소유권 주장 문제에 대해서도 저작권 주장이 가능하다.

  • PDF