• Title/Summary/Keyword: 인터넷 저작권 침해

Search Result 57, Processing Time 0.026 seconds

Design & Implementation of License-based Digital Rights Management System (라이센스 기반 디지털 저작권 보호 시스템 설계 및 구현)

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryu, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The web-based technology allows anybody who has access to the Internet to get all kinds of information from the World Wide Web. It brings about issues regarding intellectual property and copyright threats. After content is downloaded, no further protection is provided on the content that has been accessed. DRM (Digital Right Management) technologies came out to ensure the protection of copyrighted content and information. In this paper, we propose architecture of license-based digital rights management system for protection of contents and principles' rights such as contents creators, providers, distributors, and uses in contents distribution value-chain over Internet. This system makes on-line processing of all value-chain from creator to purchaser possible, compared with existing DRM products only supporting only limited distribution between distributor and purchaser.

The Improvement Method of Internet Ethics Education for the Prevention of Internet Aftereffect (인터넷 역기능 예방을 위한 인터넷 윤리 교육 개선 방안)

  • Lee, Yun Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1432-1440
    • /
    • 2013
  • In spite of advantages to using internet, but there are many adverse effects. The most well-known negative effects include internet addiction, personal information infringement, copyright violation, spread of harmful information, cyber bullying, online fraud, hacking and virus distribution, and online prostitution. Until now, the government and public organization strived to prevent and reduce the negative effects but have faced limitations. In accordance with, one of the measures the solve the problems caused by internet is to strengthen the internet ethics education. This study aims to consider and analyze the negative effects of internet and provide measures to promote internet ethics education to prevent and reduce such effects.

A Study on the Linkage and integration of UCI (Universal Content Identifier) between ICN (Integrated Copyright Number) (디지털콘텐츠 식별체계 UCI (Universal Content Identifier)와 통합저작권 관리번호 ICN (Integrated Copyright Number)간의 연계와 통합에 관한 연구)

  • Kim, Yoon-Ho;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.27-33
    • /
    • 2014
  • As UCI (Universal Content Identifier) identification system becomes a national standard for content distribution, many digital contents are distributed through UCI identification system. However, problems associated with copyright infringement and copyright contracts occur due to lack of copyright information. ICN (Integrated Copyright Number), a code system developed for copyright management, includes copyright-related information for the purposes of usage settlement and accounting, illegal usage monitoring, and content filtering. ICN, however, has no information about distribution and content properties. Therefore, the linkage and integration between UCI and ICN can be a basis for the transparent and effective distribution of digital contents. In this paper, we propose a model for linking and integrating UCI and ICN, developing the efficiency in the value chain of each identified system by analyzing political factors and key technical elements between the two identification systems.

Factors Influencing Cyber Copyright Ethics Reception and Policy Alternatives in Digital Convergence Era (사이버 저작권윤리(Cyber Copyright Ethics)의 수용에 관한 연구: 영향요인도출)

  • Lee, Ki-Shik
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.57-70
    • /
    • 2011
  • In this paper, the author focused on the establishment of structural equation model for cyber copyright ethics based upon literature reviews. And to draw a factors influencing cyber copyright ethics reception, author are applied a human-technology-contents-culture (HTCoC) perspectives. The basic idea is that copyright ethics is one of the most significant solutions to protect copyrighted materials. Among solutions like technology, institution and legal framework, ethics may be the most powerful alternatives to face with copyright infringement. Among variables, copyright culture is appeared that can mediate the other factors in cyberspace. Concluding remarks is that more sound and sustainable cyber copyright ethics is needed to cope with unexpected negative use of information technology in digital convergence era.

A Study on Software Development and Legal Regulation (소프트웨어 개발과 법적규제)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.11-20
    • /
    • 2011
  • Internet users and copyright holder have been at the center of a severe legal dispute because file-sharing soft (P2P) through Napster aggravates the violation of copyright as well as takes on the world. Though it is natural that we should hold users a criminal penalty for the illegal use of various computer programs, I think that if the supply of a computer program is generally within a circle of development act, program developer ought not to hold users criminally liable for the unintended illegal act of users. Two main issues are addressed in this work: (i) the basis and validity of legal responsibility and condemnation that appear in the precedent set as to P2P in America, Japan, and Korea. (ii) the necessity of both scientific technology development and efficient legal regulation of copyright holder. For this purpose, software development and legal regulation are reviewed analyzed from viewpoint of the criminal law.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

System Implement to Identify Copyright Infringement Based on the Text Reference Point (텍스트 기준점 기반의 저작권 침해 판단 시스템 구현)

  • Choi, Kyung-Ung;Park, Soon-Cheol;Yang, Seung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.77-84
    • /
    • 2015
  • Most of the existing methods make the index key with every 6 words in every sentence in a document in order to identify copyright infringement between two documents. However, these methods has the disadvantage to take a long time to inspect the copyright infringement because of the long indexing time for the large-scale document. In this paper, we propose a method to select the longest word (called a feature bock) as an index key in the predetermined-sized window which scans a document character by character. This method can be characterized by removing duplicate blocks in the process of scanning a document, dramatically reducing the number of the index keys. The system with this method can find the copyright infringement positions of two documents very accurately and quickly since relatively small number of blocks are compared.

인터넷 최강국, 정보보호 선진국을 위한 중점 추진과제

  • Kim, Hui-Jeong
    • Information and Communications Magazine
    • /
    • v.27 no.1
    • /
    • pp.28-34
    • /
    • 2009
  • 인터넷의 진화에 따라 우리사회는 매우 빠르게 변화하고 있으며, 이러한 변화를 선도한 인터넷은 앞으로도 개인 맞춤형, 사물 지능화 등으로 진화를 거듭하여 우리 삶에 더욱 큰 변화를 가져올 것이다. 경제적 측면에서도 인터넷을 기반으로 한 다양한 형태의 융합이 산업발전의 새로운 패러다임으로 대두되어 전력, 교통 등 산업간 융합이 가속화되고, 첨단 융합보안기술로 고(高)부가가치 신규 시장의 창출이 가능해질 전망이다. 그러나 인터넷, IT의 발전과 더불어 사이버 공격의 특성이 과거 호기심이나 자기 과시적 행태에서 조직적이고 금전적인 이익을 노리는 방향으로 확산되고 있으며, 인터넷의 익명성과 비대면성으로 인해 불건전 정보의 유통, 저작권 침해, 명예 훼손, 언어폭력 등 개인과 사회의 피해가 점증하고 있는 상황이다. 본고에서는 이러한 환경변화에 맞추어 융합을 통한 가치 창조적 정책 및 선진 인터넷 기반마련, 깨끗하고 안전한 인터넷 이용환경 조성, 글로벌 협력체계 강화 등의 전략 목표 달성을 통해 신뢰할 수 있는 인터넷 및 방송통신융합의 가치창조와 진흥이라는 미션을 완수하기 위한 한국인터넷진흥원의 주요 중점 추진과제를 정리하였다.

An Invisible Image Pattern Watermark System Using Triplet (트리플릿을 이용한 비가시적 이미지 패턴 워터마크)

  • Park, Byung-Su;Shin, Soung-Wook;Chu, Hyung-Suk;An, Chong-Koo
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.169-170
    • /
    • 2007
  • 인터넷과 통신기술의 급격한 발전으로 인한 디지털 컨텐츠의 저자 동의 없는 복사 배포의 증가는 저작권 침해 및 불법 복제 및 배포, 위조 등의 문제를 발생시켰다. 이러한 저작권 문제를 해결하기 위한 사후적 방법으로 디지털 워터마크 기술이 개발되었다. 본 논문은 이산 웨이블릿 변환의 트리플린 특징을 이용한 바코드 이미지 워터마크 알고리즘을 제안하였다. 바코드 이미지 워터마크에 일정한 패턴을 이용하여 여러 공격에 강인성을 갖게 하였다. 또한 워터마크 추출시 상관도를 구하지 않아도 시각적으로 워터마크의 삽입 여부를 확인 할 수 있으며, 낮은 상관도에서도 워터마크를 시각적으로 확인 할 수 있는 장점을 갖는다.

  • PDF

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.