• Title/Summary/Keyword: Illegal Use

Search Result 356, Processing Time 0.034 seconds

Policy Proposal to Improve Illegal Web Blocking Policy Based on SNI Blocking Technique (SNI 차단 기법 기반의 불법 웹 차단 기술적 정책 개선)

  • Park, Jeonghun;Jeong, Wonchi;Oh, Sangik;Park, Namje
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.3
    • /
    • pp.430-439
    • /
    • 2020
  • The government of the Republic of Korea has introduced SNI blocking method since February 2019 to block illegal sites. Currently, this policy has been considered as a controversial policy in South Korea therefore, about 270,000 South Koreans have been calmed down by and the presidential office petition because people believe that blocking https by SNI would invasion of privacy and freedom of use of the Internet. As soon as the SNI blocking method was used, the bypass method was opened to the Internet, causing side effects. In this study, identifies the development of Internet blocking technology and the development of new technology that bypasses the technology. It also examines Internet censorship in other countries and identifies problems in blocking technology. Through this study would present policy suggestions and technical methodologies for sound Internet use.

The Economic Effects of III-defined Property Rights: The Case of Korean Green Belt (재산권 불명(不明)현상이 자원이용에 미치는 영향에 관한 연구: 그린벨트의 경우)

  • 김성배
    • Journal of the Korean Regional Science Association
    • /
    • v.15 no.3
    • /
    • pp.15-31
    • /
    • 1999
  • This study examines the economic effects of ill-defined property rights on the resource usage with special reference to the Korean Green Belt. Property rights are considered ill-defined, when their whereabouts are not clearly delineated, they are not assigned to those who utilize them most efficiently, and they are not exercised precisely. If properly, and they are not exercised precisely. If properly rights are ill-defined, it is more likely that economic agents pursue opportunistic and illegal behaviors and even their rational behaviors tend to bring about undesirable outcomes, and social conflicts occur around the assignment of the rights. Upon the completion of a case study, we found that the ill-defined property right system of the Korean Green Belt has, in fact, resulted in several problems in resource usatge. Inefficient land use, compromising reassignment of property rights, the prevalence of illegal activities, huge management costs, and the spread of social conflicts are the problems in question. These problems can be resolved by the realignment of property rights, since they are caused by the ill-defined property right system. To resolve such problems, we need to reassign properly rights so that their delineation may be complete and those who value them highest may exercise the rights, and social justice in terms of wealth distribution may be achieved.

  • PDF

System for Anti-Piracy of Software under Windows Operating System (윈도우 운영 체제에서 불법 소프트웨어 방지 시스템)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.423-434
    • /
    • 2004
  • This paper presents the software system that protects illegal installation and use of the commercial software. The server computer in this system stores the compressed versions for all software, while client computers install all software by downloading them from the server. Also the client computers periodically report to the server whether they have illegally installed software. This system introduces authentication and encryption/decryption using the session key under Windows Operating System to prevent interception of the software package from outside world and malicious modification of the transfer message between the server and the client. The proposed system in this Paper has several advantages such as providing real-time control of license and easy maintenance of the software as well as protecting illegal use of the software.

Digital Content Certification and Management Technology Based on Blockchain Technology

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.121-128
    • /
    • 2021
  • After entering the 4th Industrial Revolution, the digital content market, which was only dependent on existing contents supply enterprises, is providing various digital content through the participation of users like YouTube. Accordingly, it activated the digital content market, but it causes a negative influence on the digital content market due to the copyright of the creator and the indiscriminate illegal use and usage of the content. This study researched digital content management technology based on blockchain technology to protect digital content and the copyright of the creator. The suggested technology protects the digital content and the copyright holder and discerns the users and prevents the indiscriminate approach and illegal use of digital content. For the safe management of digital content, hash function applied as the certification technology of blockchain is used to certify the users and manage the digital content and provide integrity and authentication service.

Survey of Farmers' Perception and Behavior for Agricultural Water Saving - Applying to Irrigation Facility Monitors in Pohang and Yeongdeok Areas - (농업용수 물절약에 대한 농업인 의식 및 행동 조사 - 포항·영덕지역 수리시설감시원을 대상으로 -)

  • Lee, Seul-Gi;Choi, Kyung-Sook
    • Journal of Korean Society of Rural Planning
    • /
    • v.26 no.3
    • /
    • pp.39-47
    • /
    • 2020
  • While agricultural water has been declared free in Korea to ensure access to these limited resource since the year 2000, farmers have however developed lackadaisical behavior towards water saving leading to its scarcity. To overcome this problem, a variety of experience-oriented education model was developed for farmers to promote the adoption of water conservation, and preventive measure against the drought impacts. In this study, farmers' awareness and their attitudinal behavior of agricultural water savings were investigated. The monitoring of water supply structure and the repair facilities in Pohang and Yeongdeok areas were conducted. The field visits and behavioral surveys showed a high degree of over-use and illegal water withdrawals by the farmers due to poor water-saving and management practices. We found that most of the KRC employees strongly admitted the necessity of water-saving education. On the other hand, the farmers showed good interest in the implementation of water-saving awareness through education. Besides this, most farmers agreed to adopt water-saving practices in the fields. Farmers also acknowledged the recklessness of water use was due to the aging of waterways, poor water management, and illegal water consumption. The majority of the farmers responded against imposing the water-use tariffs. However, there was a low response to paying the water-use charge. Aging agricultural facilities and the lack of institutional penalties or incentives were the major obstacles in achieving efficient water-saving. Considering the current drought frequency, urgent water-saving education of farmers was deemed necessary to prepare the farming community against the water shortages. Based on the results of this study, we have to identify the irrigation practices of farmers and provide water-saving education to enforce more efficient use and management of agricultural water.

Shaping of Hormone drug Knowledge and drug market: Athletes use and consumption of synthetic hormones (호르몬 약물 지식과 시장의 형성: 운동선수들의 합성 호르몬 사용과 소비)

  • Han, Gwnag Hee;Kim, Byung Soo
    • Journal of Science and Technology Studies
    • /
    • v.14 no.1
    • /
    • pp.87-116
    • /
    • 2014
  • This article focuses on synthetic hormone consumption that illegal act of heterogeneous forms of pharmaceuticalization. Athletes are not unfamiliar with the use of synthetic hormones that contain anabolic steroids. Synthetic hormones are used to increase muscle mass and strength. This drug use practice cannot simply be viewed as illegal. Athletes accumulate knowledge on these hormones that conflicts with the knowledge proffered by physicians and they consume drugs responsibly. Physicians' knowledge of these hormones is limited to their use in the treatment of abnormalities. Athletes, however, are expanding the role of these hormones to include their potential for enhancement. Thereby, a new value is assigned to synthetic hormones, and an informal market is formed. Previous studies in the fields of biopolitics and biomedicalization have mainly focused on the formal connection between biomedical science and the institutional network. This article, therefore, analyzes the informal and the various aspects of biomedicalization.

  • PDF

Design and Implementation of ACM-based Web Security Access Control System for Intranet Security (인트라넷 보안을 위한 ACM기반 웹 보안 접근 제어 시스템의 설계 및 구현)

  • Cho Nam-Deok;Park Hyun-Gun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.643-648
    • /
    • 2005
  • Intranet system for use within an organization, usually a corporation, is to basically pass through user authentication, but information can be leaked, modified, and deleted by malevolent users who disguise an authorized user or due to user's mistakes in using various functions of web browser. Thus, there is a need for measures to protect the information from illegal use, transformation through partial modification, and illegal leakage such as fraudulent use. This paper presents a flexible Web Security Access Control system based ACM which Provide efficient suity Policy to Protect information in intranet. This Web Security Access Control system not only enhances security by Performing encryption/decryption of information in intranet but also, for sharing confidential information among departments, performs effective and useful access control by assigning different authority to the secured web page. And, by controlling the functions of client PC in various ways, information leakage on malicious purpose or by mistake can be prevented.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Design of Electronic Software Distribution Protocol for Software Copyright Protection (소프트웨어 저작권 보호를 위한 전자 소프트웨어 유통 프로토콜의 설계)

  • Kim, Young-Jun;Lee, Sung-Min;Rhee, Yoon-Jung;Park, Nam-Sup;Lee, Byung-Rae;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.641-650
    • /
    • 2001
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web along with the popularization of Internet using high-speed networks. Especially, Electronic Software Distribution(ESD) is widely being focused as one of the popular researches. However, the existing models of ESD lack substantial illegal copy protection or copyright protection as they have the shortcomings of guaranteeing anonymity of users. This study suggests an ESD protocol that guarantees substantial copyright protection and anonymity based on the Public Key Infrastrncture(PKl). The suggested method does not give the information of a buyer who doesn't want to reveal to a seller, and protects illegal copy and distribution as well. When it happens that illegal copies are in circulation, this method provides a device to trace back its original distributor so that it helps protect the copyright. In addition, it provides more convenient environment to the user by not using the methods of serial number input and extra installation to use.

  • PDF