• Title/Summary/Keyword: Pirate

Search Result 55, Processing Time 0.046 seconds

A Study of Bitcoin Transaction Tracking Method through Illegal Community (불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구)

  • Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.717-727
    • /
    • 2018
  • When illegal transactions are made with bitcoin, it's not easy to track all the bitcoins used in the transaction and seize them. Especially, if criminals distribute illegal transactions by spreading them to several bitcoin addresses, it's difficult to track hidden bitcoins other than confiscated bitcoins even if some bitcoins are confiscated. This paper proposes a method for tracking and monitoring all bitcoin transactions suspected of illegal transactions. This method estimates bitcoin addresses that are highly relevant to crime among all bitcoin addresses that dealing with the address based on the bitcoin address list of the alleged crime, and keeps track of addresses that are relevant to crime and help to investigate illegal bitcoin transaction.

US28, a Virally-Encoded GPCR as an Antiviral Target for Human Cytomegalovirus Infection

  • Lee, Sungjin;Chung, Yoon Hee;Lee, Choongho
    • Biomolecules & Therapeutics
    • /
    • v.25 no.1
    • /
    • pp.69-79
    • /
    • 2017
  • Viruses continue to evolve a new strategy to take advantage of every aspect of host cells in order to maximize their survival. Due to their central roles in transducing a variety of transmembrane signals, GPCRs seem to be a prime target for viruses to pirate for their own use. Incorporation of GPCR functionality into the genome of herpesviruses has been demonstrated to be essential for pathogenesis of many herpesviruses-induced diseases. Here, we introduce US28 of human cytomegalovirus (HCMV) as the best-studied example of virally-encoded GPCRs to manipulate host GPCR signaling. In this review, we wish to summarize a number of US28-related topics including its regulation of host signaling pathways, its constitutive internalization, its structural and functional analysis, its roles in HCMV biology and pathogenesis, its proliferative activities and role in oncogenesis, and pharmacological modulation of its biological activities. This review will aid in our understanding of how pathogenic viruses usurp the host GPCR signaling for successful viral infection. This kind of knowledge will enable us to build a better strategy to control viral infection by normalizing the virally-dysregulated host GPCR signaling.

Analyzing cinematic consumption patterns of the p2p users (P2P 영화파일공유 이용자의 영화소비패턴 분석)

  • Yi, Sun-Hi;Choe, Soo-Young
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.728-736
    • /
    • 2007
  • P2P 파일공유는 1999년 처음 등장한 이래 저작권 침해로 디지털 콘텐츠 시장을 파괴하는 '해적'으로 간주 되어왔다. 하지만 최근 들어 P2P 시장의 산업적 가능성을 새롭게 주목하는 움직임이 나타나고 있다. 아울러 학계에서는 P2P의 경제적 영향력을 공급자 편향의 시각이 아닌 소비자 측면을 포함한 균형적 관점으로 바라보기 시작했다. 본 연구 역시 균형적 관점에서 P2P를 바라보려는 접근법의 일환으로, P2P 영화파일 공유 이용자들의 영화소비패턴을 실증적으로 살펴보고자 하였다. 실제 P2P 영화파일 공유 이용자들에 대한 설문결과, 이용자들은 단일한 영화소비성향을 가지고 있지 않았으며 다운로드와 극장 관람빈도가 모두 높은 이른바 '얼리어답터'형과 다운로드를 극장관람의 대체재로 여기는 소위 '해적'형이 공존하고 있었다. 이 중 그간 산업계에서 우려하던 해적형의 비율은 10% 정도로 낮았고, 대부분의 P2P 이용자들은 오히려 일반 극장 관람객보다 더 적극적으로 극장소비를 하는 사람들로 영화산업에 긍정적인 기여를 하는 것으로 밝혀졌다. 이러한 소비자 분석결과는 향후 본격화되고 있는 P2P 다운로드 유료화 시장에 대한 전망을 밝게 하는 것으로, 현재 유료화에 있어 가장 중시해야 할 것은 불법 무료 다운로드에 대한 경계가 아니라, 소비자 편의적인 시스템의 개발임을 시사한다.

  • PDF

Factors that Affect the Continuous Sharing of Digital Products and the Use of Online Services (디지털저작물의 지속적 공유와 온라인 유료서비스 이용의 영향요인)

  • Han, Jung-Hee
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.1-30
    • /
    • 2008
  • The objective of this paper is to gain a better understanding of factors influencing digital piracy and the use of paid services on the web. A model identifying and describing various factors which affect decision$\sim$makers' attitude toward sharing digital products and online behavioral intentions is constructed based on established theories of human behavior. The relationship between the continuous intention of sharing the products and the intention to use online services is also discussed. Findings show that a independent relationship exists between illegal and legal behaviors, which means stopping piracy by individuals can not lead to their buying of the products. Also while the attitude toward piracy was significantly related to the continuous intention of piracy behaviors, did not necessarily lead to the use intention of online services. The data also show that beliefs concerning consequences of digital piracy were significant enough to alter one's behavioral attitude. There was a significant relationship between perceived consequences and the intention to pirate digital products or to use paid services. The results also show that while the effect of economical and ethical factors were ascertained, that of social and legal factors have not been found. Self$\sim$efficacy has a moderating effect on the relationship between the attitude toward piracy and both intentions of online behavior. The implications of the findings to research and practice are discussed.

  • PDF

A Study of the Intelligent Coastal Surveillance System using EO/IR Vessel Image Classification (선박의 EO/IR 영상식별을 이용한 연안 감시 체계의 연구)

  • Jang, Won-Seok;Jung, Dong-Han;Kim, Joo-Yong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.230-231
    • /
    • 2018
  • Ports and coastal areas that serve as national corridors have threats such as smuggling ships, enemy infiltration ships and pirate ships. To prevent intrusion of intrusive vessels, a system is needed to continuously monitor the coastal area and detect their intrusion. However, it is difficult for surveillance personnel to identify threatened vessels while monitoring large coastal areas. In this paper, we propose a system that can monitor coastal and harbor area and automatically detect ships entering the Navigation Inhibit Area to generate alarms and classify the types of ships by image classification.

  • PDF

A Study on Environment Change of Ocean Security and Future Direction for Korea Coast Guard (해양안보의 환경변화와 해양경찰의 향후과제에 관한 연구)

  • Cho Dong-Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.12 no.3 s.26
    • /
    • pp.225-231
    • /
    • 2006
  • The ocean provides with not only the global environment and ecology, which is essential for human beings survival, but also various resources for human beings prosperity. The ocean security is to secure and keep the benefits that the ocean provides with to human beings. It is essential to keep enforcement measures for the ocean security. Major marine countries are challenging to secure ocean environment and resources since UNCLOS. The utmost policy priority should be given to the ocean security in Korea.

  • PDF

Analysis of the change of the characters according to the change of the media -A Study on Composite Representation of Game Character in Sandboxed Indy Game (매체의 변화에 따른 캐릭터의 시대적 변화분석 -샌드박스형 인디 게임에 있어 게임 캐릭터 융복합적 표현법에 대한 고찰)

  • Lee, Dong-Lyeor
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.335-340
    • /
    • 2019
  • With the development of the media, pirate platforms and technologies are critical to the design of video content. Games based on online platforms and networking can help you develop games and expand your game as games are developed. Better yet. This paper is a major feature of the growth of the sandbox game that leads the game of InGame. Phenotypical 3D Dress Graphics You can study the usefulness of graphics based on doubles, the advantages of game characters, and space game graphics.

An Anonymous asymmetric public key traitor tracing scheme (익명성을 보장하는 비대칭 공개키 공모자 추적 기법)

  • 최은영;이동훈;홍도원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.49-61
    • /
    • 2004
  • In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber's anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously and one purchases multimedia contents without giving a lot of information about his lifestyle, habits, and etc, but anonymity control is provided, i.e., a data supplier can date traitors.

Dictionary Based Software Watermarking Technique (사전 소프트웨어 워터마크 기술 기반)

  • Pervez, Zeeshan;Lee, Sungyoung;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

Shadow Libraries: A Bibliometric Analysis of Black Open Access Phenomenon (2011: 2023)

  • Safinaz Mahmoud Elroukh
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.21-32
    • /
    • 2024
  • This study analyzes the global literature on the black open-access phenomenon from 2011 to 2023. A bibliometric analysis was conducted using the Scopus database. The search strategy employed advanced queries with multiple synonymous terms to ensure exhaustive retrieval of relevant documents. The VOSviewer software was employed to visualize the co-occurrence networks. The findings reported 90 papers published during the study period. An evolving scholarly landscape was revealed, with heightened attention from 2016 onwards, peaking in 2017, 2021, and 2023. Articles constitute 83.3% of the total published documents. Singh and Srichandan are prolific authors, with 11.2% of the total publications. The United States contributes 18.9% of the papers, followed by India and Spain. Information Development and Scientometrics are pivotal journals in scholarly discussions about this scope, contributing 4.4% of publications. Co-occurrence network visualization revealed "Sci-Hub" and "open access" as the most used keywords in the global literature. The findings underscore the need for additional research to discover innovative business models to safeguard intellectual property rights while meeting researchers' evolving needs. The importance of this paper comes from being the first bibliometric study analyzing international literature related to this phenomenon, which provides a basis for future research efforts and policymaking.