• Title/Summary/Keyword: Illegal Use

Search Result 356, Processing Time 0.027 seconds

A System of Software Asset Management in Company using the Server (서버를 이용한 사내 소프트웨어 자산관리 시스템)

  • Lee, Young Gyo;Park, Jin Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Illegal software use have been abroad through online (internet) and offline (CD, DVD, USB, etc.). It infringes intellectual property rights and weakens the will to software development. Also, it generates the software errors and virus intrusion in PC. It hinders national software industry and induces the personal and national trade friction. Many group (company, office, organization, institution, etc.) have been realized the prohibition of illegal software use. But, it is too hard to monitor and control illegal software use. In this paper, we propose a method of software management in a group. A software module of client agency is installed in all PC of the group. A main server of the software management controls the all of the PC through the communication. The server blocks the install of illegal software, permits the install / use of honest goods software, monitors the license (term, amount) in all the PC. The system prevents errors of illegal software use, all cuts the virus intrude through the illegal software, improves the performance of PC relatively.

The Relationship between Outcome Expectancy and Adolescents' Illegal Use of Music Sources: Double Mediating Effects of Reward Sensitivity and Social Dilution of Responsibility (청소년의 불법음원사용에 대한 결과기대와 사용행동 간의 관계: 보상민감성과 사회적 책임감 희석의 이중매개효과)

  • Lim, Yoon-Taek
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.285-293
    • /
    • 2021
  • This study aims to identify the relationship between outcome expectancy and illegal use of music sources, and examined the parallel double mediating model of reward sensitivity and social dilution of responsibility on that relationship. To achieve the purpose this study, data were collected from 302 male and female high school students living in Seoul metropolitan area, and a double mediating effect was analysed with PROCESS Macro 3.5 Model 4. Results indicated that outcome expectancy was positively correlated with reward sensitivity, social dilution of responsibility, and illegal use of music sources of high school students, whereas reward sensitivity and social dilution of responsibility were positively correlated with illegal use of music sources. This study found that reward sensitivity and social dilution of responsibility were mediating outcome expectancy and illegal use of music sources in parallel. These findings suggest that psychological mechanisms lead adolescents use illegal music sources might be important, and provide useful information for making strategies to prevent adolescents' uses of illegal music sources.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

A study on illegal dental treatment (치과 무면허 불법 시술에 대한 연구)

  • Kim, Hyeongsu;Kim, Vitna
    • Journal of Korean society of Dental Hygiene
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2013
  • Objectives : This study intended to figure out illegal treatment by unlicensed person in dental area and factors, which were considered as user's position on the basis of the local community investigation of health conditions in chungbuk provinces in 2008. Methods : This study used chi-square test and complex sample design of multi-variate logistic regression analysis to question 12,443 peoples who have experience on illegal dental treatment. Results : Multi-variate logistic regression analysis results showed that factors having related to illegal dental treatment are sex, age, education standards, subjective awareness of oral health condition, drinking experience of lifetime, unmet need of dental treatment, chewing difficulty, use of dentures, experience of scaling and the use of interdental care instrument. Conclusions : As a result of this study, in order to root out illegal dental treatment, we need to expand the breadth of health insurance coverage so that it can reduce the burden of dental expenses. Moreover, we need to set out health service of public oral health to inform the importances of maintaining good oral health and the problems of illegal dental treatment by unlicensed person.

A Study of the Detecting Method about the Identification Card's Counterfeit, Modification and Illegal Use by Minors (미성년자의 신분증 위·변조 및 도용을 검출하기 위한 방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.87-101
    • /
    • 2018
  • Minors' law evasion is getting serious. Some of them make a fake ID card or use a stolen ID card illegally. They are illegally used for buying alcohol, cigarette, bond or going to club, pub, motel and so on. On the latest News, there was a case that teens rented a car with a driver licence without checking and had severe car accident. Like this case, car rental service was fined and suspended from business because they did not figure out ID card's counterfeit or modification. Thus, this study investigates the detecting method about the ID card(including a driver license) counterfeit, modification or illegal use. The server has a database of 17~19's minors one fingerprint and services whether the visitor is adult true or not. The method will be usable and economical for business. Then, it was compared and analyzed with methods already in use in business.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

The Rational Regulation of Illegal & Harmful Information in Cyberspace (모바일 라이브 스트리밍 서비스의 불법·유해방송 근절에 관한 연구)

  • Song, You-Jin;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.231-236
    • /
    • 2017
  • This study analyzes the characteristics of mobile live streaming service, the illegal and harmful information characteristics of mobile live streaming service for the purpose of eradicating illegal and harmful broadcasting, and shows illegal and harmful broadcast on the mobile live streaming service and eradication plan. First, we reviewed the mobile live streaming service, illegal and harmful broadcasts through literature review, and secondly surveyed illegal and harmful broadcasts of mobile live streaming services and their awareness and countermeasures. As a result, it is confirmed that the mobile live streaming service is illegal, harmful broadcasting exposure frequency is high, illegal, and harmful broadcasting exposure is caused by characteristics of real time broadcasting rather than user's. In order to eradicate the illegal and mobile information about the mobile live streaming service, it is necessary to fix the illegal service and harmful broadcasting reporting system, but the government has confirmed the requirements for regulatory measures. From a microscopic point of view, it will be necessary to investigate the illegal use of mobile live streaming services and the eradication of harmful information.

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

Location aware system using arduino (아두이노를 이용한 위치감지 시스템)

  • Choi, Min-ki;Lee, Jun-sik;Jung, Jae-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.565-568
    • /
    • 2016
  • Recently, the number of illegal parking is increasing as the number of cars are increasing. Especially, people who use residential parking permit program are in trouble because of illegal parking. The most typical example is that people who use residential parking permit are damaged in expense, etc and various social issues such as legal actions are caused by illegal parking. In this paper, we discuss about the arduino design for the system and uploading the location information to use the location information for a parking system.

  • PDF