• Title/Summary/Keyword: Prevention of Piracy

Search Result 8, Processing Time 0.023 seconds

A Study on Establishment of High-Risk Areas for the Prevention of Piracy Damage (해적피해 예방을 위한 고위험해역 등 설정 방안)

  • An, Kwang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.1
    • /
    • pp.39-46
    • /
    • 2022
  • Piracy cases have been increasing globally since 2007. Recently, the waters of West Africa including the Gulf of Guinea, emerged as the most dangerous areas in the world. To prevent piracy damage to ships and crew, the Korean government amended the Piracy Damage Prevention Act on August 17, 2021 to newly define the risk area and the high-risk area for piracy. It also established the legal framework for restricting the entry of ships into such high-risk areas. This study aims to discuss and present a plan for establishing risk areas and high-risk areas for piracy to be noticed by the government in accordance with the amended Act. In this study, international piracy trends, international response measures and the status of international high-risk areas were investigated and analyzed, the matters to be considered to designate high-risk areas were identified. It is expected that the resulting information on high-risk areas for piracy can be utilized not only for the development of government policies on the prevention of piracy, but also as basic academic data.

An Exploratory Study on the Antecedent Factors to the Piracy of the Digital Copyrights (디지털 저작물의 불법복제 행동에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kwak, Won-Il;Choi, Won-Il
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.47-62
    • /
    • 2008
  • The purpose of this study is to explore the antecedent factors to the piracy of the digital copyrights in order to provide basic data for piracy prevention policy. The findings of study revealed that most respondents had experiences to copy MP3 files illegally. And many respondents answered they didn't copy pirated material by themselves but others did piracy a lot. The feeling of quilt and anxiety against piracy is shown very low level. Low copy cost and regulation level significantly impact upon the cognitive level of other's piracy. Updated contents, the higher price of authenticated materal, piracy regulation are the significant antecedent factors to the level of piracy. The level of piracy activity and anxiety against piracy are significantly different by age. The cognitive level of other's piracy, piracy activity and anxiety are significantly different by gender.

  • PDF

Utilization Policy of the Private Security against Acts of Piracy (해적행위에 대한 민간경비의 활용방안)

  • Kim, Il-Gon;Ahn, Hwang-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.777-786
    • /
    • 2009
  • In recent, the ships of the Republic of Korea have been suffered from acts of piracy at the seas. With the increase of the threats from the acts of piracy and armed robbery against ships, some of the countries have dispatched their navy warships to the international waters and to carry out military operation against the pirates. However, the total eradication of the piracy has not been achieved due to the lack of international cooperation and the limitation of the international maritime convention itself. In addition, the absence of counter-measures to be taken by the ships itself including the employment of the professional maritime security forces should not be overlooked. In this connection, this paper examined the reality of the piracy together with armed robberies at the seas and the problems in the response were also analyzed. Based on the research, it suggested some possible measures with special reference to the private security. The limitation of this paper is that it only focus on the aspect of the private security. In this paper, the cooperation among the countries according to the maritime convention and internationally accepted norms and practices. To achieve the goals of this paper, through the comparative review of the related literatures, the practical measures applicable to the prevention of the piracy were suggested.

A Study on Utilization and its Model of the Private Military Companies(PMCs) in Introducing the Legal System in Korea (민간군사기업의 법제화 필요성과 그 모델에 관한 연구)

  • Kwak, SunJo
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.149-161
    • /
    • 2018
  • The private military company(PMC) or the private military industry may be one of the most important, but little understood developments in security studies to have taken place over the last decade. This new industry, where firms not only supply the goods of warfare, but rather fulfill many of the professional service functions, is not only significant to the defence community, but has wider ramifications for global politics and warfare. The private military industry emerged in the early 1990s. Its underlying cause was the confluence of three momentous dynamics - the end of the Cold War and the vacuum this produced in the market of security, transformations in the nature of warfare, and the normative rise of privatization. In order to introduce MPFs(Military Provider Firms) into Korea, where in principle private citizens are prohibited to own a gun, unlike the United States, a special law should be enacted which allows them to possess weapons and fight in combat. Therefore, the National Assembly of Korea has been submitting and discussing "the Act on the Prevention and Conduction of Practice of Piracy" since 2014.

  • PDF

Suitability of Alternative Dispute Resolution for the Fashion Industry - Focused on Arbitration for the Fashion Industry - (패션산업의 대체적 분쟁해결제도 적합성 - 패션산업의 중재 제도 도입을 중심으로 -)

  • Lee, Jae-Kyoung
    • Journal of Arbitration Studies
    • /
    • v.25 no.1
    • /
    • pp.87-105
    • /
    • 2015
  • Intellectual property law is slowly fighting to keep pace with the rapid growth of the fashion industry. Copyright and patent law have proven only minimally effective in fashion, even in the US and other top fashion nations, forcing designers and fashion companies to rely on their trademarks to protect their work. Litigating trademark disputes in the fashion industry presents a host of problems as witnessed in a recent Christian Louboutin case, leading the parties to resort to Alternative Dispute Resolution(ADR) and Online Dispute Resolution(ODR). ADR methods, especially arbitration, are increasingly emerging as substitutes to litigation. Using these methods, the fashion industry (CFDA in the US case) should sincerely consider a self-regulating program in which its members, both fashion designers and corporations alike, can resolve disputes in a manner mutually beneficial to all parties in order to preserve the industry's growth, solidarity, and esteem In particular, for the US fashion industry, the ongoing Innovative Design Protection and Privacy Prevention Act(IDPPPA) anti-counterfeit legislation could have caused a chilling effect against innovation. New designers with no name and less resources who could normally flourish producing inspired-by designs may find themselves subject to copyright infringement legislation since the IDPPPA may expand the protection of established designers and brands with more resources. This fear and its implication could be solved by the fashion industry itself since fashion experts know best how to handle these fast-paced issues arising in the field. Therefore, stakeholders in the fashion industry should commit to protecting innovation within fashion on a long-term basis by establishing a panel handling an ADR process. This can mitigate the uncertainty created by the IDPPPA or any other legislation from elsewhere, which could result in a shying away from experimentation with inspired-by designs.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.