• Title/Summary/Keyword: Illegal Content

Search Result 147, Processing Time 0.53 seconds

An Appropriate Parent Role Model for Alcohol, Tobacco and Other Drug Abuse Prevention in Adolescence (청소년의 술, 담배, 기타 약물남용 예방을 위한 적극적인 부모역할 모델)

  • Burm, Jin Bil
    • Korean Journal of Clinical Pharmacy
    • /
    • v.13 no.1
    • /
    • pp.18-28
    • /
    • 2003
  • An appropriate parent role model for alcohol, tobacco and other drug abuse prevention in adolescence was designed as part of a comprehensive effort to reduce the use of alcohol, tobacco and other drugs by underage youth. The content of the model offers a new and positive chemical health model. The model calls for development of a set of guidelines that can provide the framework for examining alcohol, tobacco and other drug use. The actions of adults in the community, especially parents, are very important factors in whether or not youth use chemicals. So these guidelines can be used to assist parents and other adults with questions such as, what can we say to young people about using alcohol, tobacco or other drugs except that it's against the law? At what age and times are discussions appropriate? What can we do to make our community a healthier place in which young people can make better decisions about alcohol, tobacco and other drug use? The model acknowledges and affirms the legal and appropriate use of alcohol and other drugs as well as supports the decision not to drink. It encourages participants to consider their own guidelines for using and not using alcohol and other drugs. The guidelines can also be used as the basis for early intervention when use is illegal, unhealthy or risky. It is important to note that the model affirms healthy and appropriate use as well as nonuse.

  • PDF

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.215-218
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Accordingly, Smart Phone users to hack their Jail Breaking and Rooting and illegal use of the multimedia content is copyrighted. Also relevant to mobile communication terminal as a high crime, create, and the digital evidence increases the utilization of the mobile forensic evidence is required to study. In this paper, Smart Phone Copyright Violation and Forensic Apply Method research. Smart Phone Status and related violations of copyright infringement, broadcasting, film, music, e-book, etc. for each survey item, and how to apply for forensics were studied. This study investigated the development and forensic science will be able to contribute to the development.

  • PDF

A Restoration Method for Geometric Distortions to Improve Scanned Books Identification (스캔 도서 식별 성능 향상을 위한 기하하적 왜곡 복원 방법)

  • Kim, Doyoung;Lee, Sang-Hoon;Jadhav, Sagar;Lee, Sanghoon
    • Journal of Broadcast Engineering
    • /
    • v.20 no.3
    • /
    • pp.379-387
    • /
    • 2015
  • In recent years, copyright violations from illegal copying and distribution of e-comic contents have become an important issue. Fingerprinting techniques have been emerged to provide a fast and reliable identification method of identifying e-comic contents. When illegally scanned or camera captured comic contents are distributed, they suffer from distortions. So the fingerprint differs from the original version. This paper presents a restoration framework for correcting geometric distortions in distorted comics to improve the comic content identification.

The Effective Protection Mechanism for Digital Images using Transform of the Wavelet in Frequency Domain (주파수 영역에서 웨이브릿 변환을 이용한 디지털 이미지의 효과적인 보호)

  • 최우진;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.937-942
    • /
    • 2002
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

The DRM System for UCC Rights Protection (UCC 저작권 보호를 위한 DRM 시스템)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.35-39
    • /
    • 2010
  • UCC is a key characteristic of so-called Web 2.0 which encourage the publishing of one's own content and commenting on other people's. Nowadays, UCC has become a widely used. Accordingly, problem of copyright become a issue. In this paper, we propose the DRM system for UCC rights protection. The system solve the copyright problem in UCC. Therefore, UCC creator can exert the right of UCC. In addition, if the problem of copyright occur, we can find the illegal user and call a him to account by CE information which is stored in UCC server and have a property that a manufacture of original contents can control the copyright.

A Study on Image Electronic Money based on Watermarking Technique (워터 마킹 기술을 활용한 이미지 전자화폐에 관한 연구)

  • Lee, Jung-Soo;Kim, Whoi-Yul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1335-1340
    • /
    • 2004
  • This study introduces a technology utilizing digital images as electronic money by inserting watermark into the images. Watermarking technology assign contents ID to images and inserts the contents ID into the images in an unnoticeable way. The server that manages the issue and the usage of mage electronic money (called ‘WaterCash’ hereafter) stores issued contents ID to database and manage them as electronic money. WaterCash guarantees anonymity and prevents the forgery and modification of WaterCash based on semi-fragile watermarking technique. In addition, WaterCash is transferable and the illegal use of WaterCash can be prevented based on the watermarking technology. The watermarking .technology used in this paper was designed to be robust to image compression but vulnerable to intentional or non-intentional Image processing.

Cybercrime in the Economic Space: Psychological Motivation and Semantic-Terminological Specifics

  • Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;Ishchuk, Olena;Bondar, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.135-142
    • /
    • 2021
  • The article reveals the essence of cybercrime, approaches to understanding this concept, classification of cybercrime, and other illegal acts in this area. The concept of cybercrime has multi-discourse nature and a certain legal uncertainty. Cybercrimes, their forms and types are analyzed in the economic context. The research vocabulary of the economic industry is defined. The scope and content of concepts denoted by the terms of the sphere covered by cybercrime are studied, and its types and forms are analyzed. The article studies problems, achievements, and prospects of resisting and combating cybercrime during the development of the civil information society and Ukraine's entry into the global information space. The study focuses on the economic motivation of most cybercrimes since some material benefit from the fact of cyber offenses is assumed directly or indirectly.

The Study on Effect of Emissions and Performance of a Conventional Vehicle using the High Concentration Alcohol Blended Petroleum Product (고농도 알코올 혼합 석유제품이 자동차 성능 및 배출가스에 미치는 영향 연구)

  • KIM, SUNG-WOO;DOE, JIN-WOO;KIM, KI-HO;HA, JONG-HAN
    • Journal of Hydrogen and New Energy
    • /
    • v.26 no.6
    • /
    • pp.629-637
    • /
    • 2015
  • As concern about energy security and global warming many countries have been making effort to reduce fossil fuel. In the case of US, as one of the efforts, the standards of the alcohol vehicle fuels(including blended with gasoline) have been established. Alcohol is known that make some trouble concerning startability, durability and corrosion when using as fuel of a conventional vehicle. For these reason, alcohol usage needs not only the fuel standard, but also a modified car. In the case of Korea, although there are no the standard and the modified vehicle yet, high concentration alcohol blended fuel has being sold at illegal market. In this study, exhaust gas and performance of the conventional vehicle that alcohol(methanol and isopropyl alcohol) blends were fueled were measured to notify danger of using them without preparation of institutional arrangements. Also, to analyze correlation characteristics of the fuels and them, property test of the fuels was conducted. The test result show that bad-startability caused by low RVP and high T10 affected increase in NMOG and CO. NOx was increased under the highest short term fuel trim caused by high Oxygen content and low NHV of alcohol. According to increasing as alcohol content, fuel economy and acceleration ability were decreased but $CO_2$ was not significantly decreased.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF