• Title/Summary/Keyword: Piracy Site

Search Result 10, Processing Time 0.036 seconds

Improved Piracy Site Detection Technique using Search Engine

  • Kim, Eui-Jin;Kim, Deuk-Hun;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2459-2472
    • /
    • 2022
  • With the increase in copyright content exports to overseas markets due to the recent globalization of the Korean culture, the added value of the Korean digital content market is increasing at a significant rate. As such, as the size of the copyright market increases, different piracy sites have emerged that generate profits by illegally distributing works without the permission of the copyright holders, resulting in direct and indirect damage to these copyright holders. The existing copyright detection methods used in public institutions for solving this problem are limited, while the piracy sites are ever-changing. Methods are being continuously developed to achieve better detection results. To this end, it is possible to detect the latest infringement site domain by detecting the infringement site domain that is constantly changed through the search engine. This paper proposes an improved piracy site detection method using a search engine to prevent the damage caused by piracy sites.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

A study on the Stream Piracy at Subunchi in Jangsu-Gun, Jeonlabuk-Do, Korea (전북 장수군 수분치의 하천쟁탈에 관한 연구)

  • Son, Ill
    • Journal of the Korean Geographical Society
    • /
    • v.49 no.6
    • /
    • pp.795-811
    • /
    • 2014
  • Stream piracy is one of the dynamic geomorphic processes in the mountainous area. If many stream piracies were concentrated in a certain region, the concentrated distribution of those might reflects the geological structure and tectonic movements of that region. In this study, the stream piracies identified in the lower areas between the Chiri and the Deokyoo mountainous areas were analyzed in relation with the tectonic line from Kwangju to Pohang and the so-called Hansan Mountains. The stream piracy at the Subunchi occurred between the lower-altitude, higher-gradient upper reach of the Seomjin-River flowing on the lower-level basin and the higher-altitude, lower-gradient upper reach of the Geum-River flowing on the higher-level basin. The geomorphic evidences concerning the stream piracy and the human responses to the headward erosion might be found in the vicinity of stream piracy site. Together with the Deunbongsaem(the source fountain of Geum-River), the Subunchi at which the geomorphic processes of stream piracy could be identified in a small area will be a good site for the geography education as well as the geo-tourism.

  • PDF

Feature Analysis and Detection Techniques for Piracy Sites

  • Choi, Seul-Ki;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2204-2220
    • /
    • 2020
  • In recent years, digital content has become easily accessible because of internet technology. Representative examples of such digital content include various types, such as music, TV, (program, sport, drama etc.) and films. However, there are cases where internet technology is used in illegal ways without the authorization of the copyright holder for digital content. Such actions have a direct impact on copyright owners' profits and further affect the development of the digital culture industry adversely. Therefore, in this study, we analyze features to detect piracy sites that cause copyright infringement. Further, we develop a piracy site detection crawler based on these features and present the analysis of its performance.

Level of User Awareness for Illegal Downloading of Movie Content (영상 컨텐츠 불법 복제에 관한 사용자 의식 수준)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.212-224
    • /
    • 2009
  • Proliferation of high performance internet infrastructures finally allows their users download a single copy of regular movie just within in a couple of seconds. Ease of accesses to the software for downloading consequently leads them insensitive to the ethics or legitimacy of their conduct. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Whilst the level of awareness is addressed even in a far-fetched manner in the area of music piracy and computer software piracy, the case of movie is much different in that we even fail to find any survey that has been made for movie piracy. The survey has been made by devising questionnaires for netizens and it was posted web WorldSurvey, which is the most prominent online survey site in Korea. To our surprise, 9 out of 10 respondents expressed they actually resort to illegal downloading for the reason of convenience. We realized one more surprise. More than 95% of netizens conspicuously aware of their downloading behaviors are mischievous and illegal without reservation.

Design and Implementation of Management Systems for Software License (소프트웨어 라이선스 관리시스템의 설계 및 구현 : K사 사례를 중심으로)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Ko, Mi-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.3_spc
    • /
    • pp.315-331
    • /
    • 2013
  • As the business has been highly informatized, many companies has bought the software for their works. There are two types of software license. One is a site license and the other is a user license. This paper is focused on the user license. User license has the number of the right to use software. So, software managers always need to know the number of licenses in use and should limit the number of software license in use. If someone in the company use a software without license, he will be treated as a piracy. In that case, the company should pay for the settlement cost for the exceeding license use. In this paper, we suggest the model how we can limit the installation of the software within the number of licenses by license management system.

A study on role of ROK Escort Task Gruop according to recently Pirate Conducting Trend and Anti-Piracy Operation in Indian Ocean (최근 인도양 해적활동과 대해적작전 변화에 따른 한국 청해부대 역할 연구)

  • Choi, Hyoung-Min
    • Strategy21
    • /
    • s.32
    • /
    • pp.192-221
    • /
    • 2013
  • In order to deal with the current economic crisis, the U.S. government, as a part of its austerity fiscal policy, implemented a budget sequester. The sequester will hit the U.S. defense budget the hardest, and as a result will most likely put the security of the international community in jeopardy. The U.S. will have to cut 46 billion dollars from its original 525 billon defense spending in 2013. And by the year 2022, will have to cut 486.9 billion dollars. Such an astronomical decrease in the U.S. defense spending will inevitably burden the friendly nations. According to recent studies, pirate related incidents in Somalia, where piracy is most active, has declined from its 226 incidents to 76 incidents per year in 2012, a 66% drop from previous years'. However, piracy threats as well as those related to firearms still remain and thus participants of anti-piracy operations, namely the U.S., U.K., France, Canada, NCC, EUNAVFOR, and NATO, are facing a problem of declining forces. Considering the current situation as well as rising expectations from the international community, Republic of Korea, a supporter of NCC's maritime security operation, not to mention its foremost duty of securing its sea, is at a stage to re-examine its operational picture. Such action will be a good opportunity for Republic of Korea to build the trust and live up to the international community's expectation. To quote from the network theory, although in relation to other friendly nations participating in the anti-piracy operation, Republic of Korea currently remains at a single cell level, this opportunity will certainly develop Korea to a 'node' nation in which power and information would flow into. Through this expansion of operational capability, Republic of Korea will be able to exert more influence as a more developed nation. Currently however, not only is the single 4,500 ton class destroyer deployed in Somalia a limited unit to further expand the scale and amount of force projection in the area, but also the total of six 4,500 ton class destroyers ROK feet possess is at a high fatigue degree due to standard patrolling operations, midshipman cruise and the RIMPAC exercise. ROK fleet therefore must consider expanding the number of ships deployed along with either deploying combat support ships or constructing logistics support site in the African region. Thus, by expanding its operational capabilities and furthermore by abiding to the rightful responsibilities of a middle power nation, Republic of Korea will surely earn its respect among the members of the international community.

  • PDF

Automated Detection Technique for Suspected Copyright Infringement Sites

  • Jeong, Hae Seon;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4889-4908
    • /
    • 2020
  • With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Analysis of Teachers' Needs for the Active Use of Educational Information Sharing System (교육정보공유체제 이용 활성화를 위한 교사의 요구 분석)

  • Cho, Jin-Suk;Oh, Mi-Ja;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.97-110
    • /
    • 2013
  • The purpose of this study is to analyze the needs of teachers as main users to make suggestions for active use of educational information sharing system. The study sets three research tasks about the problems of the current system, improvements, and desired content from the perspective of teachers. To collect specific opinions, we conducted an open questionnaire survey and made a qualitative analysis using the NVivo 10 program. The present system has such problems as functional issues, lack of data reliability, systemic problems for sharing and use. We suggest that in order to enhance Web site services, authoring tools for editing contents and new search engines with customized search function need to be provided. In addition, the open market service system has to be established, so that teachers can actively create, share, and distribute to meet the various needs of teachers. Finally, to promote free access to the system, copyright issues need to be resolved to prevent the potential digital piracy.

  • PDF