• Title/Summary/Keyword: Piracy

Search Result 153, Processing Time 0.028 seconds

A Study on the Historical Origin of Private Security Industry in Korea (우리나라 보안산업의 역사적 기원에 관한 연구)

  • Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.91-111
    • /
    • 2010
  • Around the middle of the ninth century the strict bone-rank system of Silla frustrated many people who had political ambition but lacked nobility. They had to seek other ways, including maritime trade. Such an undertaking reflected and also increased their economic and military power. Trade prospered with T'ang China and with Japan as well. The threat of piracy to Silla's thriving maritime trade caused to create a succession of garrisons at important coastal points. Chonghae Jin (Chonghae garrison) was regarded as the most important of these. It was established in 828 by Chang Pogo. Chonghae Jin was on Wando, an island just east of the southwestern tip of Korea and a key place at this time in the trade between China, Korea, and Japan. From this vantage point Chang Pogo became a merchant-prince with extensive holdings and commercial interests in China and with trade contacts with Japan. Although piracy was rampant in East Asia at that time, either the Chinese or Silla government was not able to control it due to inner political strife and lack of policing resources. Infuriated by the piracy and the government's inability to control it, Chang Pogo came back to Silla to fight against the pirates and to protect maritime trade. He persuaded the king of Silla and was permitted to control the private armed forces to sweep away the pirates. In 829 he was appointed Commissioner of Chonghae-Jin with the mission of curbing piracy in that region. Chang's forces were created to protect people from pirates, but also developed into traders among Silla Korea, T'ang China, and Japan in the 9th century. This was geographically possible because the Chonghae Garrison was situated at the midpoint of Korea, China, and Japan, and also because Chang's naval forces actually dominated the East Asia Sea while patrolling sea-lanes. Based on these advantages, Chang Pogo made a great fortune, which might be collected from a charge for protecting people from pirates and the trades with China and Japan. Chang's forces could be termed the first private security company in the Korean history, at least in terms of historical documents. Based on historical documents, the numbers of private soldiers might be estimated to exceed tens of thousands at least, since Chang's forces alone were recorded to be more than ten thousand. Because local powers and aristocratic elites were said to have thousands of armed forces respectively, the extent of private forces was assumed to be vast, although they were available only to the privileged class. In short, the domination of Chang's forces was attributable to the decline of central government and its losing control over local powers. In addition it was not possible without advanced technologies in shipbuilding and navigation.

  • PDF

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF

A Design and Implementation of the Source Code Plagiarism Detection System

  • Ahn, Byung-Ryul;Choi, Bae-Young;Kim, Moon-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.319-323
    • /
    • 2005
  • As the software industry develops at a rate speed, anyone can copy or plagiarize without difficulty contents that are becoming digitalized. To make it worse, the development of various contents that be illegally copied and plagiarized are resulting in the increasing infringement on and the plagiarism of the intellectual property. This dissertation tries to put forth the method and the theory to effectively detect any plagiarism of the source code of programs realized in various languages. This dissertation analyzes the advantage and disadvantage of the plagiarism test software, and especially, presents a method to detect possible plagiarism by using the Pattern Matching to overcome its disadvantage. And it also intends to introduce more developed automatic detection system by overcoming the problems with the method of Pattern Matching.

  • PDF

A Study on the Impact of Copyright Protection on Social Welfare in the Software industry (소프트웨어 산업에서 저작권보호가 사회적 후생에 미치는 영향에 관한 연구 -네트워크 외부성 유.무에 따른 비교분석을 중심으로-)

  • 이규식;최선규;남찬기
    • Journal of Korea Technology Innovation Society
    • /
    • v.4 no.3
    • /
    • pp.355-368
    • /
    • 2001
  • The importance of software industry is rapidly increasing with the growth of Internet and the advent of digital economy. The purpose of this study is to research the impact of the copyright protection for securing producers and enhancing of producing on social welfare. The Korean government reformed the copyright law to enhance the copyright protection in 2000 and intensely controlled software piracy in 2001. However, copyright protection has much controversy in aspects of hindering social use of software. This study compared and analyzed the general equilibrium and the copyright protection for social welfare maximization in two cases when network externality exists or not, by assuming the simple demand and supply functions.

  • PDF

신기술 출현과 동아시아 기술혁신체제의 변화 : 한국, 일본 및 대만 기술혁신체제의 거버넌스 비교

  • 김혁래;오인규;박헌준
    • Journal of Technology Innovation
    • /
    • v.10 no.2
    • /
    • pp.45-68
    • /
    • 2002
  • This paper raises two questions about the overall national innovation system (NIS) in Korea, Japan, and Taiwan - (1) what has distinguished the three countries in terms of their NIS in the past and (2) why are the changes that are taking place now, relatively make the NIS in these countries similar to each other\ulcorner At present, the NIS of each country is becoming more privatized and flexible than the pre-financial crisis period. We argue that this assimilation is due to the free flowing technologies readily available in the international technology markets. We argue significant shifts in the NIS of these three countries, notably a move from a manufacturing-based NIS with a high level of protection, piracy, and stability to a venture-based NIS with high levels of flexibility, risk taking, and technological innovation.

  • PDF

An Empirical Study of Digital Contents Piracy Behavior on Online (온라인디지털콘텐츠 불법복제 행동에 관한 연구)

  • Choi, Eun-Jee;Gim, Gwang-Yong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.453-456
    • /
    • 2008
  • 소프트웨어와 음악파일, 영화 등의 불법복제로 인한 사회적인 문제가 대두되어 왔다. 온라인디지털콘텐츠의 산업규모와 중요성이 증대되고 있는 시점에서 동일하게 불법복제로 인한 피해규모와 이용자들의 불법복제 행동이 만연해 있다. 이 연구는 계획된 행동이론(TPB)를 통해 개인의 온라인디지털콘텐츠의 불법복제 행동에 대한 모형을 검증하고 불법복제에 영향을 미치는 요인을 검증하고 인과관계를 확인하고자 한다. TPB의 확대모형을 제안하고자 하는데 단속, 교육 및 홍보, 이전경험, 자기효능감이 불법복제 행동의도와 의도에 영향을 미치는 태도와 주관적 규범에 어떠한 영향을 미치는지 검증해보고 한다. 단속과 교육 및 홍보가 개인의 인식과정을 통해 태도와 내적인 자기 규범에 어떠한 영향을 미칠 것인지는 정책적 전략적 시사점을 얻는데 중요한 요인이 될 것이다. 파일럿 테스트 결과 기존 TPB 모형은 온라인디지털콘텐츠 영역에 있어서도 적합한 모델임이 검증되었고, 단속과 교육 및 홍보가 태도와 주관적 규범에 유의한 영향을 미침을 나타내었다.

  • PDF

Piracy of China's Trade Marks and Domain Names and Cultivation of its Famous Brands

  • Wang, Guo-an
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.3-12
    • /
    • 2004
  • A large number of Chinese trade marks and domain names have been registered improperly or illegally by foreign companies or businessmen. Additionally, a large number of famous Chinese brands have vanished through joint ventures, mergers and acquisitions since foreign direct investment (FDI) came to China more than two decades ago because some Chinese managers have not been fully aware of the value of trade marks and domain names. Consequently, the number of China's registered trade marks and famous brands does not match China's export volume and its Number four trade status in the world. China's enterprises have yet to realize the effects of these events. It is very important for China to protect and cultivate its own famous brands. This paper discusses Chinese companies' neglect of the value of their trade marks and domain names, and the possible consequences. Additionally, this paper puts forward suggestions concerning the protection and cultivation of China's famous brands.

  • PDF

Computer Ethics in Computer Education (컴퓨터 윤리에 관한 연구)

  • Joo, Young-Ju;Lee, Kwang-Hi
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.84-100
    • /
    • 1997
  • All technology has both intended and unintended effects, we have said, and information technology is no exception. Information technology offers a number of challenges: those of computer education, computer literacy, the ethical and societal impacts of computing and communication systems. Current computer education focuses primarily on the history, parts and usage of a computer, and programming, it does not fully include the moral standards or ethics that help guide behavior and conduct for citizens of Information society. The purpose of this study is to review of the theoretical issues and societal impacts of computers, communication systems and computer ethics; then, to nalyse current curriculum and content of school computer education in Korea: finally, to develop a possible course in computer ethics containing a goal statement and aspects of computer literacy. Contents in computer ethics covers issues of nettiquette, privacy, health, copyright-related software and network piracy, computer crime and viruses. Six suggestions are made for the computer ethics of Information Age in the conclusion.

  • PDF

1D FN-MLCA and 3D Chaotic Cat Map Based Color Image Encryption (1차원 FN-MLCA와 3차원 카오틱 캣 맵 기반의 컬러 이미지 암호화)

  • Choi, Un Sook
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.406-415
    • /
    • 2021
  • The worldwide spread of the Internet and the digital information revolution have resulted in a rapid increase in the use and transmission of multimedia information due to the rapid development of communication technologies. It is important to protect images in order to prevent problems such as piracy and illegal distribution. To solve this problem, I propose a new digital color image encryption algorithm in this paper. I design a new pseudo-random number generator based on 1D five-neighborhood maximum length cellular automata (FN-MLCA) to change the pixel values of the plain image into unpredictable values. And then I use a 3D chaotic cat map to effectively shuffle the positions of the image pixel. In this paper, I propose a method to construct a new MLCA by modeling 1D FN-MLCA. This result is an extension of 1D 3-neighborhood CA and shows that more 1D MLCAs can be synthesized. The safety of the proposed algorithm is verified through various statistical analyses.

Detection Technique of Suspected Piracy Sites based on Image Black List (이미지 블랙리스트 기반 저작권 침해 의심 사이트 탐지 기법)

  • Kim, Eui-Jin;Jung, In-Su;Song, Yu-Rae;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.148-150
    • /
    • 2021
  • 저작권 콘텐츠의 해외 진출과 함께, 국내·외 저작권 시장 규모가 증가하고 있다. 이와 동시에 등장한 저작권 침해사이트는 메인 페이지에 저작권 침해사이트를 대표하는 이미지를 게시하는 특징이 있다. 이러한 저작권 침해사이트는 음악, 영화, 드라마 등의 저작권 콘텐츠를 불법 유통시키며 저작권 시장에 피해를 입히고 있다. 공공기관에서는 저작권 침해를 방지하기 위해 저작권 침해사이트를 차단하는 등의 대응을 하고 있지만, 저작권 침해사이트의 생성 속도에 비해 침해 여부 판단 속도가 상대적으로 느려서 차단에 어려움이 존재한다. 따라서, 본 논문에서는 저작권 침해사이트의 대표 이미지를 활용한 이미지 블랙리스트에 기반하여 저작권 침해 의심 사이트 탐지 기법을 제안하고자 한다.