• Title/Summary/Keyword: Illegal information

Search Result 772, Processing Time 0.057 seconds

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

Status of Illegal Hazardous Information for Chemical on Internet - Monitoring Cases of Chemical Cyber Surveillance - (인터넷 상 화학물질 불법 유해정보 현황 고찰 - 화학물질 사이버감시단 신고 사례를 중심으로 -)

  • Hwang, Man Sik;Im, Ji Young;Jeon, Da Young;Song, Ki Bong;Lee, Sang Mok;Ryu, Ji Sung;Lee, Ji Ho
    • Korean Journal of Hazardous Materials
    • /
    • v.6 no.2
    • /
    • pp.13-22
    • /
    • 2018
  • Recently, social crimes using chemicals at home and abroad are increasing. These chemicals are readily available in the internet. Therefore, the NICS(national institute of chemical safety) runs a 'Chemical Cyber Surveillance' to help the public take control of the internet and create a healthy cyberspace through voluntary participation of the public. The study analyzed more than 1,000 sites suspected illegal hazardous information or blocked among cyber surveillance 3,500 case reports in the past yeas. And, the number of illegal hazardous information reported in the past three years is analyzed by type and substance. They want to examine the characteristics of hazardous chemical information on the internet and use it as a basic data to establish illegal information management measures that spread over cyberspace.

RSA Algorithm for User Authentication System

  • Song, Byung-Ho;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.207-210
    • /
    • 2003
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system, which can protect information from illegal users.

  • PDF

Development of an Intelligent Illegal Gambling Site Detection Model Based on Tag2Vec (Tag2vec 기반의 지능형 불법 도박 사이트 탐지 모형 개발)

  • Song, ChanWoo;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.211-227
    • /
    • 2022
  • Illegal gambling through online gambling sites has become a significant social problem. The development of Internet technology and the spread of smartphones have led to the proliferation of illegal gambling sites, so now illegal online gambling has become accessible to anyone. In order to mitigate its negative effect, the Korean government is trying to detect illegal gambling sites by using self-monitoring agents or reporting systems such as 'Nuricops.' However, it is difficult to detect all illegal sites due to limitations such as a lack of staffing. Accordingly, several scholars have proposed intelligent illegal gambling site detection techniques. Xu et al. (2019) found that fake or illegal websites generally have unique features in the HTML tag structure. It implies that the HTML tag structure can be important for detecting illegal sites. However, prior studies to improve the model's performance by utilizing the HTML tag structure in the illegal site detection model are rare. Against this background, our study aimed to improve the model's performance by utilizing the HTML tag structure and proposes Tag2Vec, a modified version of Doc2Vec, as a methodology to vectorize the HTML tag structure properly. To validate the proposed model, we perform the empirical analysis using a data set consisting of the list of harmful sites from 'The Cheat' and normal sites through Google search. As a result, it was confirmed that the Tag2Vec-based detection model proposed in this study showed better classification accuracy, recall, and F1_Score than the URL-based detection model-a comparative model. The proposed model of this study is expected to be effectively utilized to improve the health of our society through intelligent technology.

Criminal liability of Internet Service Provider who leave illegal positing to take its own course (인터넷불법게시물을 방임하는 인터넷서비스제공자의 형사책임)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.163-170
    • /
    • 2012
  • Nowadays Internet is the greatest and most participating media of prompting expression with 37 million users in Korea. Internet enables collective communications between social members and contributes to form sound public opinions and to develop democracy while it has negative aspect to distribute massively crime by illegal posting which is forbidden by the Criminal Act. Criminal actors who involve to diffuse information on Internet consist of three categories of information provider, user and internet service provider. Illegal posting generated on Internet is originated from IP and the criminal regulation on it is useless and meaningless because of its countless of users and ambiguous boundary with liberty for expression. Accordingly, the only criminal policy means to prevent danger by illegal posting on Internet is to regulate ISP which saves illegal posting and mediates contacts among users. In spite of it, legislation to regulate ISP is unprepared. The prudent legislative review should be done. And it should be accordance with the doctrines of propriety and vagueness of the principle of "nulla poena sine lege".

Location aware system using arduino (아두이노를 이용한 위치감지 시스템)

  • Choi, Min-ki;Lee, Jun-sik;Jung, Jae-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.565-568
    • /
    • 2016
  • Recently, the number of illegal parking is increasing as the number of cars are increasing. Especially, people who use residential parking permit program are in trouble because of illegal parking. The most typical example is that people who use residential parking permit are damaged in expense, etc and various social issues such as legal actions are caused by illegal parking. In this paper, we discuss about the arduino design for the system and uploading the location information to use the location information for a parking system.

  • PDF

The Survey and the Proposal of Inspection Method for Illegal Program Reproduction (프로그램 불법 복제 감정에 대한 고찰 및 발전방안의 제시)

  • 조동욱;한길성;전병태
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1439-1444
    • /
    • 2001
  • Inspection of program products illegal reproduction is a significant field in deciding illegal recopy of program duplication, reproduction, plagiarization and electronic information by expertized programmer or specialist using computer science knowledge and technical methods. This is important for propelling the S/W industry in the high value creating industry. In particular, social demands are increasing the conflicts of the program products illegal recopy because of knowledge property problems. Therefore, legal and structural methods have been inspection of the program products illegal copy and usage. This article describes the existing problems of the inspecting of the program products illegal recopy and discusses the future directions and developing methods for propelling and setting the knowledge property industry field such as S/W industry.

  • PDF

Implementation of Illegal and Objectionable Multimedia Retrieval Using the MPEG-7 Visual Descriptor and Multi-Class SVM (MPEG-7 시각서술자와 Multi-Class SVM을 이용한 불법 및 유해 멀티미디어 분석 시스템 구현)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryou, Jea-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.711-712
    • /
    • 2008
  • We developed a XMAS (X Multimedia Analysis System) for analyzing the illegal and objectionable multimedia in Internet environment based on Web2.0. XMAS uses the MPEG-7 visual descriptor and multi-class SVM (support vector machine) and its performance (accuracy on precision) is about 91.6% for objectionable multimedia analysis and 99.9% for illegal movie retrieval.

  • PDF

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

The Relationship between Outcome Expectancy and Adolescents' Illegal Use of Music Sources: Double Mediating Effects of Reward Sensitivity and Social Dilution of Responsibility (청소년의 불법음원사용에 대한 결과기대와 사용행동 간의 관계: 보상민감성과 사회적 책임감 희석의 이중매개효과)

  • Lim, Yoon-Taek
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.285-293
    • /
    • 2021
  • This study aims to identify the relationship between outcome expectancy and illegal use of music sources, and examined the parallel double mediating model of reward sensitivity and social dilution of responsibility on that relationship. To achieve the purpose this study, data were collected from 302 male and female high school students living in Seoul metropolitan area, and a double mediating effect was analysed with PROCESS Macro 3.5 Model 4. Results indicated that outcome expectancy was positively correlated with reward sensitivity, social dilution of responsibility, and illegal use of music sources of high school students, whereas reward sensitivity and social dilution of responsibility were positively correlated with illegal use of music sources. This study found that reward sensitivity and social dilution of responsibility were mediating outcome expectancy and illegal use of music sources in parallel. These findings suggest that psychological mechanisms lead adolescents use illegal music sources might be important, and provide useful information for making strategies to prevent adolescents' uses of illegal music sources.