• Title/Summary/Keyword: Illegal information

Search Result 772, Processing Time 0.03 seconds

The Exploratory Study on Prevention of illegal Medical Advertisement in Healthcare Market

  • Jeun, Young-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.105-110
    • /
    • 2017
  • It is natural that the medical advertisement should be guaranteed as part of the basic commercial activities of medical institutions. However, the general public are non-specialist and they have less informed about medical care than medical specialists, and it is not easy to judge and select medical information. Also, if someone damaged by illegal medical advertising, it cannot be recovered to the original. In this regard, medical advertising has been legislated so that medical organizations can pre - screen the medical laws. However, In December 2015, after the Constitutional Court ruled unconstitutional preliminary censorship, it became virtually impossible to pre-screen. In recent years, illegal medical advertisement have been on the rise, and false and exaggerated medical advertising are increasing the damage to medical consumers. Therefore it is urgent to take countermeasures about this. Thus, this paper try to analyzes the characteristics of general commercial and other medical advertisements and looks for alternatives that can minimize the damage caused by illegal medical advertisements and institutional weaknesses by analyzing the regulatory trends in medical advertising.

A New Scheme Based On Multiple Antennas For Tracking Illegal Small Drones (다중 안테나 기반의 불법 소형 드론 추적 성능 개선 기법)

  • Kim, Ryun Woo;Ryu, Jong-Yeol;Ban, Tae Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.1000-1003
    • /
    • 2021
  • In this paper, we investigate how to track illegal drones by using communication signal received from illegal drones, which is a promising candidate position tracking scheme for anti-drone systems, and is particularly effective in tracking small illegal drones in urban areas. We propose an enhanced tracking scheme using multiple antennas to improve the performance of tracking by reducing the error of position tracking. In the proposed tracking scheme, a tracker is equipped with four receive antennas that are evenly spaced 90 degrees apart, and received signal strength indicators (RSSIs) received by four receive antennas are pre-averaged before being used to calculate the distance between tracker and target. Our numerical results show that the proposed scheme outperforms the conventional scheme in terms of accuracy.

A Study on Detecting System of Illegal Automobile Using a Seal-Bolt UHF RFID Tag Antenna (봉인볼트용 UHF RFID Tag Antenna를 이용한 차량인식에 관한 연구)

  • Chung, You Chung;Kim, Ki-sik;Seol, Chang-hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.157-161
    • /
    • 2017
  • This paper introduce UHF miniaturized RFID tag antenna which is embedded on the seal-bolt or plastic bolt for automobile plate. To detect the illegal and un-registered car, the illegal automobile detection system has been developed using the seal-bolt UHF RIF tag antenna. The diameter of seal-bolt UHF tag is about 24mm, almost the same size as 100 Won coin. The simulated and measured reflection coefficient are compared, and the reading range patten is also measured. If seal-bolt tag is embedded on car plate, police can get information of automobile and detect illegal vehicles easily with the illegal automobile detection system.

An Effective Method for Blocking Illegal Sports Gambling Ads on Social Media

  • Kim, Ji-A;Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.201-207
    • /
    • 2019
  • In this paper, we propose an effective method to block illegal gambling advertisement on social media. With the increase of smartphone and internet usage, users can easily access various information while sharing information such as text and video with a large number of others. In addition, illegal sports gambling advertisements are also continue to be transmitted on SNS. To avoid most surveillance networks, users are easily exposed to illegal sports gambling advertisement images by including phrases in the images that indicate illegal sports gambling advertisements. In order to cope with these problems, we proposed a method to actively block illegal sports gambling advertisements in a way different from the conventional passive methods. In this paper, we select words frequently used for illegal sports gambling, classifies them into three groups according to their importance, calculate WF for each word using weighted formula by degree of relevance and frequency, and then sum the WF of the words in the image. Blocking, warning, and passing were determined by cv, the total of WF. Experimenting with the proposed method, 193 out of 200 experimental images were correctly judged with 96.5% accuracy, and even though 7 images were illegal sports gambling advertisements. Further research is needed to block 3.5% of illegal sports betting ads that cannot be blocked in the future.

A Classification Model for Illegal Debt Collection Using Rule and Machine Learning Based Methods

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.93-103
    • /
    • 2021
  • Despite the efforts of financial authorities in conducting the direct management and supervision of collection agents and bond-collecting guideline, the illegal and unfair collection of debts still exist. To effectively prevent such illegal and unfair debt collection activities, we need a method for strengthening the monitoring of illegal collection activities even with little manpower using technologies such as unstructured data machine learning. In this study, we propose a classification model for illegal debt collection that combine machine learning such as Support Vector Machine (SVM) with a rule-based technique that obtains the collection transcript of loan companies and converts them into text data to identify illegal activities. Moreover, the study also compares how accurate identification was made in accordance with the machine learning algorithm. The study shows that a case of using the combination of the rule-based illegal rules and machine learning for classification has higher accuracy than the classification model of the previous study that applied only machine learning. This study is the first attempt to classify illegalities by combining rule-based illegal detection rules with machine learning. If further research will be conducted to improve the model's completeness, it will greatly contribute in preventing consumer damage from illegal debt collection activities.

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

A Study of the Impacting Factors on Sharing Illegal Digital Contents and Copyright Cognition (불법 디지털콘텐츠 공유의도에 영향을 미치는 요인과 저작권인식에 관한 연구)

  • Shen, Hong Yan;Lim, Gyoo Gun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.23-40
    • /
    • 2018
  • In order to reduce the spread of illegal digital contents, many studies have been focusing on how to stop it through laws and regulations. Only few of the studies tried to explain the illegal behaviors from individual's viewpoints. This paper aims to examine the intention of sharing illegal digital contents over the Internet and proposes a theoretical model based on the Theory of Planned Behavior (TPB) along with the introduction of two outcome expectations. We also argue that the individuals' cognition of online copyright will influence individuals' illegal contents sharing on the Internet. We have collected data from online survey and offline interview. By empirical study, the results support the theoretical model except the subjective norm which has no effect on individuals' behavior. This is a different finding from the previous researches revealing that the subjective norm has no effect on individuals' unethical actions. Overall, the findings provide strong confirmation that attitude, self-efficacy and outcome expectations impact on individual's intention of sharing illegal contents. In addition, this study proposed an improved cognition of online copyright through education and standard of new media management will reduce illegal contents sharing on Internet.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Implementation of Digital Contents Safety Trade System using Encryption Technology (암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.119-125
    • /
    • 2013
  • The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.