• Title/Summary/Keyword: Piracy

Search Result 153, Processing Time 0.024 seconds

A Study on Piracy Matters and Introduction of the Privately Contracted Armed Security Personnel on Board Ships (해적사건 대응을 위한 무장경비원제도 도입방안에 관한 연구)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.293-326
    • /
    • 2014
  • Piracy is a worldwide issue, but the deteriorating security situation in the seas off Somalia, the Gulf of Aden and the wider Western Indian Ocean between 2005 and 2012 and in the increasing number of attacks in the Gulf of Guinea are a major problem. The depth of concern for the problem internationally is amply demonstrated by the levels of co-operation and coordination among naval and other forces from several countries that have assembled in the west Indian Ocean region and the Gulf of Aden to escort ships carrying humanitarian aid to Somalia and to protect vulnerable shipping. Notwithstanding this unprecedented effort, the vast sea area in which the pirates now operate makes it difficult to patrol and monitor effectively, particularly with the limited resources available. More resources, in the form of naval vessels and aircraft, are needed and at every opportunity the IMO encourages Member Governments to make greater efforts to provide the additional naval, aerial surveillance and other resources needed through every means possible. IMO provide interim guidance and recommendations to be taken into account when considering the use of PCASP(privately contracted armed security personnel) if and when a flag State determines that such a measure would be lawful and, following a full risk assessment, appropriate. The interim guidance and recommendations of IMO are not intended to endorse or institutionalize the use of armed guards. Therefore, they do not represent any fundamental change of policy by the Organization in this regard. It is for each flag State, individually, to decide whether or not PCASP should be authorized for use on board ships flying their flag. If a flag State decides to permit this practice, it is up to that State to determine the conditions under which authorization will be granted. Therefore, Korea should be introduced rationally PCASP for safe shipping. PCASP on board ships is much the same to special guard personnel of security services industry act. Act plan of Oceans and fisheries ministry on PCASP collides with special guard personnel system of National Police Agency. Rather than new law making, PCASP regukations have to be included in security services industry act. Management Agency of PCASP is to not Oceans and fisheries ministry, but Central Headquarters Korea Coast Guard of Public Safety and Security Ministry because of specialty and closely connection.

  • PDF

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

Measuring Similarity of Android Applications Using Method Reference Frequency and Manifest Information (메소드 참조 빈도와 매니페스트 정보를 이용한 안드로이드 애플리케이션들의 유사도 측정)

  • Kim, Gyoosik;Hamedani, Masoud Reyhani;Cho, Seong-je;Kim, Seong Baeg
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.15-25
    • /
    • 2017
  • As the value and importance of softwares are growing up, software theft and piracy become a much larger problem. To tackle this problem, it is highly required to provide an accurate method for detecting software theft and piracy. Especially, while software theft is relatively easy in the case of Android applications (apps), screening illegal apps has not been properly performed in Android markets. In this paper, we propose a method to effectively measure the similarity between Android apps for detecting software theft at the executable file level. Our proposed method extracts method reference frequency and manifest information through static analysis of executable Android apps as the main features for similarity measurement. Each app is represented as an n-dimensional vectors with the features, and then cosine similarity is utilized as the similarity measure. We demonstrate the effectiveness of our proposed method by evaluating its accuracy in comparison with typical source code-based similarity measurement methods. As a result of the experiments for the Android apps whose source file and executable file are available side by side, we found that our similarity degree measured at the executable file level is almost equivalent to the existing well-known similarity degree measured at the source file level.

Broadcast Program Distribution System of PKI Certificate-based (PKI 인증서기반 방송 프로그램 유통시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1760-1766
    • /
    • 2009
  • Digital broadcasting and digital CATV and IPTV will continue in the competition, regardless of how the content of the program was broadcast over the Internet distribution and the damage of piracy is also growing. Excellent quality of the content of the digital CATV sales of DVD and high-density storage media because there is no difference in content and quality is the problem of illegal distribution. However, users can record and reuse program in the position of the guaranteed rights, and the purpose of training in fair and illegal recording and distribution needs to be separate from it. In this paper using a digital certificate recorded by the user and the process to ensure the purpose of illegal distribution of pharmaceutical distribution system design and implementation of the program was broadcast.

A Study of User Environment for Fair Use of Open Source Software (공정한 오픈소스소프트웨어 활용을 위한 사용자환경 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.357-364
    • /
    • 2012
  • For the resistance of the closed intellectual property license from the Free Software Movement. It's free and also can adapt have been widely used. Software for the resistance of the closed intellectual property rights have been promoted by the free software movement. Implementation of the proposed changes in the license that anyone can freely use the software and adapt open source software is widely used. The product of open source software can reduce development time and cost. Many people who use it will improve, verification and developed. However, indiscriminate use of these advantages, as well as the risk of dispute is high. This study is analyzed open source software dispute cases for piracy protection and will show duly open source software available to users by user environment.

Ethical Fashion Design (윤리적 패션 디자인)

  • Ko, Hyun-Zin
    • Journal of the Korean Society of Costume
    • /
    • v.60 no.8
    • /
    • pp.151-167
    • /
    • 2010
  • This research is to analyze ethics in fashion design for more valuable and sustainable human life against the increasing alienation of the human being, the global ecological crisis resulted from contemporary consumption society. I expect that it can be helpful to plan ethical fashion design practice more effectively. For this, the documentary study and practical case study have been executed. The results are as follows. The ethics in design can be defined as the responsibility to reform the social, environmental problem of consumptive design, to sustain together without human alienation, environment disruption and to do social good for total human being ultimately. The ethical design practice means to suggest solutions to problems of human rights and environment and to act willingly. Based on this, ethical fashion design appeared as responsible design solution which has two directions. One is the fashion design for coexistence and sharing, including the design for all which considers even underprivileged minority, the design to promote public issues as well as to donate some profits. The other is the eco fashion design for sustainable environment, including eco-friendly design which is reductive and slow in whole design process, the design to inform the seriousness of environmental crisis as well as to donate some profits. The last one of the most important ethical responsibility as fashion designer is to abide by vocational ethics, that is, the prohibition of design piracy.

Revitalization and Present Status of China's Film Industry (중국 영화산업의 현황과 활성화방안)

  • Jin, YanJun;Bae, Ki-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.420-435
    • /
    • 2013
  • Film industry is a high value-added industries, and boosts the self-esteem of the people, as a measure of a country's culture, the country's strategic industries. However, China's film industry, making elevated by an exclusive screening sector consists unprofessional experiencing difficulties, such as investment, high taxes, and entrance fees, disparities between urban and rural development, piracy. To solve these problems, this study used the literature research methods, including books, papers related to domestic research. The results shows that china's film industry need to reform the production, distribution, screenings and build a plan such as the reasonable admission fee, movie-related professional manpower, additional market activation, and the balanced development of the theatre chain, the expansion of the global market space.

Computerizing Production and Distribution of Academic Resources Using KISTI-ACOMS 2.0 (KISTI-ACOMS 2.0을 이용한 학술 정보 생산 및 유통의 전산화)

  • Jeong Hee-Seok;Kim Byeong-Kyu;Kang Mu-Yeong;Park Jae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1543-1555
    • /
    • 2005
  • In this paper, we design and implement KISTI-ACOMS 2.0, extended from its previous version, applicable to all the academic societies by integrating new concepts, functions and services. KISTI-ACOMS 2.0 provides membership management, paper review management, replaces most extensive customizing with configuration, and supports a variety of unique features such as English service for foreign authors and reviewers, similar article search for preventing piracy and user access control, which are difficult to be implemented in the existing systems being used by Korean societies. Therefore, many academic societies can configure KISTI-ACOMS 2.0 more easily and promptly, and manage their own business such as society administration and journal publication online more effectively.

  • PDF

Implementation of Authentication Algorithm for CDMA Digital Mobile Communication System (CDMA 디지털 이동통신 시스템의 인증 알고리즘 구현)

  • Kim, Bum-Sik;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.3 no.2 s.5
    • /
    • pp.204-214
    • /
    • 1999
  • The user authentication service can be used to prevent telecommunications piracy and to demand reliable payment from subscriber. Over the last few years several of the cryptographic systems being used by the IS-41 North American Mobile telephones have been broken. These algorithms included ORYX, CMEA and CAVE. The process of replacing these algorithms is already underway. In this paper we designed a hash function and applied it to the authentication algorithm of IS-95A authentication system. We also analyzed the randomness properties of designed algorithm using statistical analysis and simulated the validity of this algorithm using C programming language.

  • PDF

IPR Issues in World contents Industry - Japanese countermeasures and Its Lessons to Korea - (세계 컨텐츠산업의 지적재산권 문제 - 일본의 대책과 한국에의 시사점 -)

  • Chung, Su-Won
    • Journal of Arbitration Studies
    • /
    • v.19 no.2
    • /
    • pp.229-243
    • /
    • 2009
  • The content industries environment has been undergoing significant changes due to rapid technological innovation and content market expansion. Interest in the industry is growing fast both in Asia and Europe. However, in Japan content industries are showing almost zero growth with no increase in overseas expansion. Until now, Japanese content industries have been able to grow based on domestic demands. Many different factors contributed to today's zero growth in Japanese content industries. Two main reasons are: 1) Their lack of interest in overseas expansion and 2) Insufficient investment in domestic human resources development. Considerable amounts of Japanese contents including films, music, games, and animations have been distributed in many Asian countries and today piracy problems in the region are at a serious level. According to 2004 records pirated editions accounted for 85%, 16%, 19%, and 36% in China, Korea, Hong Kong, and Taiwan respectively. Pirated editions bring economic losses to Japanese copyright profits. Making it worse, they weaken the motivation to create content and make it hard to activate cultural exchanges. Losses from copyright violations in Japanese content industries are expected to keep increasing in the future. In order to make Japan competitive and grow it is crucial to take proper measures to protect copyright infringements. This study considers the current situation of the Japanese content market, infringement issues in content which is causing many problems in Asian countries, including China, and facts about losses caused by this problem.

  • PDF