• Title/Summary/Keyword: Illegal information

Search Result 772, Processing Time 0.048 seconds

A Development Strategy of Harmful Information Protection System (유해정보 선별차단 시스템의 발전방향)

  • 이승민;남택용;장종수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.721-723
    • /
    • 2004
  • As the Internet use has been spreading worldwide, illegal and harmful contents have been increasing on the Internet, which has become a very serious social problem. To prevent children form exposing themselves to such illegal and harmful contents on the Internet, harmful information protection systems have been developed. We examine component technologies of harmful information protection systems including text and image-based filtering solutions as well as url-based filtering solution. Also we examine the related trends and strategies which effectively prevent access to the harmful contents.

  • PDF

A Study on Factors that Influence the Attitude to Pirate Smartphone Application (스마트폰 애플리케이션 불법적 사용 태도에 미치는 요인 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.19-34
    • /
    • 2014
  • As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.

Development of the filtering technology of illegal IPTV contents (IPTV 불법복제콘텐츠 필터링 기술 개발)

  • Kim, Jong-An;Kim, Jong-Heum;Kim, Jin-Han;Chin, Young-Min
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.108-111
    • /
    • 2009
  • In this paper, both various content filtering methods and technological trends are briefly reviewed. A novel method is provided for preventing the illegal copies of copyright IPTV contents from being propagated through the P2P sites and web harddisk services.

  • PDF

A Study of User Recognition of the Copyright in Academic Libraries (대학도서관 이용자의 저작권인식에 관한 연구)

  • You, Yang-Keun
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.1
    • /
    • pp.355-375
    • /
    • 2008
  • Copyrights have threatened by some people even though information transfer methods are various and users can change information with others rapidly through the improvement of digital technology. The purpose of this study is to identify illegal actions against academic library users and to propose a solution to the copyright problem. Through understanding general concepts of copyrights and illegal cases against copyrights, collected essential cases were analysed. The results show that library users have copied and transferred illegally some materials with knowing unlawful actions.

  • PDF

Broadcast Program Distribution System of PKI Certificate-based (PKI 인증서기반 방송 프로그램 유통시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1760-1766
    • /
    • 2009
  • Digital broadcasting and digital CATV and IPTV will continue in the competition, regardless of how the content of the program was broadcast over the Internet distribution and the damage of piracy is also growing. Excellent quality of the content of the digital CATV sales of DVD and high-density storage media because there is no difference in content and quality is the problem of illegal distribution. However, users can record and reuse program in the position of the guaranteed rights, and the purpose of training in fair and illegal recording and distribution needs to be separate from it. In this paper using a digital certificate recorded by the user and the process to ensure the purpose of illegal distribution of pharmaceutical distribution system design and implementation of the program was broadcast.

Based PKI System for Secure Authentication on IPTV (IPTV에서 PKI기반의 안전한 인증시스템)

  • Shuai, Wang;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.899-905
    • /
    • 2009
  • IPTV service is one of the representatives for the integration of broadcasting industry and communication industry, which also can meet users' various demands and provide efficient service. As the increasing number of IPTV users and contents servers, it is necessary to provide the safety authority system to prevent the illegal audio-visual, incorrect audio-visual authority, and illegal authority control. This thesis puts forward PKI(public Key Infrastructure) as the foundation key production mechanism. Through this mechanism, the key can be transferred safely to users and authenticate the ID of users and contents servers. In a word, our system can provide safe and efficient service for mutual authentication.

Real time detection algorithm against illegal waste dumping into river based on time series intervention model (시계열 간섭 모형을 이용한 불법 오물 투기 실시간 탐지 알고리즘 연구)

  • Moon, Ji-Eun;Moon, Song-Kyu;Kim, Tae-Yoon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.5
    • /
    • pp.883-890
    • /
    • 2010
  • Illegal waste dumping is one of the major problems that the government agency monitoring water quality has to face. One solution to this problem is to find an efficient way of managing and supervising the water quality under various kinds of conditions. In this article we establish WQMA (water quality monitoring algorithm) based on the time series intervention model. It turns out thatWQMA is quite successful in detecting illegal waste dumping.

Vehicle License Plate Recognition System on PDA for Illegal Parking Car Regulation (주정차 단속을 위한 PDA 기반의 자동차번호판 인식 시스템)

  • Yoon Hee-Joo;Cho Hoon;Koo Kyung-Mo;Cha Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.792-795
    • /
    • 2006
  • In this paper, we propose a method of vehicle license plate recognition on PDA for illegal parking car regulation. we classified three kinds of vehicle license plates being used down to date since the introduction of each vehicle license Plate using features of each one. And we recognized vehicle license plates segmentation the AreaName, the AreaCode, the TypeCharacter and the Numbers. A 88.7% recognition accuracy was obtained through the experiment of the proposed vehicle license plate recognition system using the obtained images of PDA.

  • PDF

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

The Protection System of Digital Contents using a Frame Filter Information based on Public Key (공개키 기반의 프레임 필터 정보를 이용한 디지털 콘텐츠 보호 시스템)

  • Koh Byoung-Soo;Jang Jae-Hyuk;Kang Seok-Jue;Choi Yong-Rak
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.1-9
    • /
    • 2004
  • The growth of Internet is the main factor that activates the Digital Contents Market and gives the convenience, efficiency and usefulness to the users. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. As a result, recently we can see that using the contents illegally through Internet makes the troubles between providers and customers and finally they are at law. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using, We developed the system prohibits a imprudent using in order to activate the Digital Contents Market, We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through network.

  • PDF