• Title/Summary/Keyword: Unlawful Information

Search Result 26, Processing Time 0.026 seconds

Legal Structure and Improvement Measures of Police Responsibility for Unlawful Information in the Cyberspace

  • Gu, Hyung-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.105-111
    • /
    • 2016
  • Circulating various pieces of unlawful information that violate the law by leaking personal information or circulating violent/sexual materials or malignant programs in the cyberspace is unlawful, and blocking this beforehand is an important duty of the state. Preceding discussions on the legal restriction of unlawful information in the cyberspace have mostly been focused on the criminal responsibilities and civil responsibilities of information communications service providers, but this study has approached it with emphasis on the issue of police responsibility for the exercise of police authority to block unlawful information. It is because the principles of police responsibility to determine the target of police authority to block unlawful information provide the standards for the interpretation of existing laws and regulations and function as legislative principles for the enactment of new laws and regulations to prevent risks in the cyberspace.

Monitoring method of Unlawful Parking Vehicle using RFID technology and Neural Networks (RFID 기술과 신경망 알고리즘을 이용한 불법 주차 차량 감시 방법)

  • Hong, You-Sik;Kim, Cheon-Shik;Han, Chang-Pyoung;Oh, Seon;Yoon, Eun-Jun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.13-20
    • /
    • 2009
  • RFIDs have been used a lot of control systems such as library and security efficiently. Unlawful parking control is one of them and it will bring a lot of merit. Especially, it can be used vehicles. If a vehicle comes to unlawful parking place, reader system read the tag of a vehicle. RFID reader confirm the vehicle and record current time at the same time send information related the vehicle to the server system. After, it can be activated. If the vehicle move from unlawful parking place, RFID reader record departed time. In this paper, we proposed a monitoring system for unlawful parking cars. Especially, it is certain that this proposed modelling is very efficient and correct.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

A Study on Medical Information Privacy Protection Law and Regulation in the Information Age (정보화시대의 환자진료정보 보호에 관한 법.제도적 고찰)

  • Youn, Kyung-Il
    • Korea Journal of Hospital Management
    • /
    • v.8 no.2
    • /
    • pp.111-129
    • /
    • 2003
  • This study discusses the direction of legislation to strengthen the legal protection of medical records privacy in information age. The legislation trends on privacy protection of medical records in European Union and United States are analysed and the current law and regulation of Korea on medical records are compared. The issues discussed include the ownership of medical records, the patient's right of access to medical records, medical information publication for other than treatment or insurance processing use, confidentiality responsibility of provider organizations, medical information management in provider organizations, penalty for the unlawful use of patient information. This study concludes that the patients' right on medical record and provider organization's responsibility in processing patient information should be strengthened in order to protect patients' privacy and to conform to the international standard on medical record protection in the information age.

  • PDF

A Study on the Economies of Promotion Gifts in the Newspaper Industry (신문판매시장 경품의 경제에 관한 고찰: 경품의 지속 원리와 딜레마)

  • Lee, Eun-Ju
    • Korean journal of communication and information
    • /
    • v.37
    • /
    • pp.270-306
    • /
    • 2007
  • This study examines the economies of promotion gifts in the newspaper industry. Because of the oligopolistic structure, the newspaper industry shows highly concentrated market. Under the certain circumstance, the dominant firms are struggling to become the market leader by providing unlawful promotion gifts and unbearable price discount which yields the prisoner's dilemma. Ultimately, in spite of the criticism about their unlawful behaviors, the dominant firms choose the fierce competition with high costs. On the other hand, the remaining fringe firms do not have many strategic choices due to the limited financial capacity. They cannot provide free gifts or any other incentives to the subscribers. Even worse, because advertisers and subscribers also prefer promotional gifts as a rational choice, the distorted mechanism has been sustained in the newspaper industry. Thus, governmental interventions hardly achieve the goal of controlling unfair trade. This study examines the structure, strategic behaviors of the players, and the unintended consequences leading to the dilemma on promotional sales in the newspaper industry.

  • PDF

A Study of User Recognition of the Copyright in Academic Libraries (대학도서관 이용자의 저작권인식에 관한 연구)

  • You, Yang-Keun
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.1
    • /
    • pp.355-375
    • /
    • 2008
  • Copyrights have threatened by some people even though information transfer methods are various and users can change information with others rapidly through the improvement of digital technology. The purpose of this study is to identify illegal actions against academic library users and to propose a solution to the copyright problem. Through understanding general concepts of copyrights and illegal cases against copyrights, collected essential cases were analysed. The results show that library users have copied and transferred illegally some materials with knowing unlawful actions.

  • PDF

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

Design and Implimentation of Intrusion Detection System on Contents Security (컨텐츠 보안 침입 탐지 시스템 설계 및 구현)

  • Kim, Young Sun;Seo, Choon Weon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.164-168
    • /
    • 2015
  • As Internet use is widespread advertising through the Web, shopping, banking, etc. As the various services offered by the network, the need for Web security is increasing. A security system for the protection of information assets and systems against various types of external hacking threats and unlawful intrusion will require. Intrusion Detection Tool of the paper web will have is to increase the security level, to prevent the loss of resources and labor spent by the individual monitoring of the web. Security intrusion detection system analyzes the cause of the problem of the security vulnerability and exposure of the information on the Web. Using a monitor to determine a fast support of security is to design a security system for the purpose of protecting the information security vulnerability and exposure information.

A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems (저전력 RFID 시스템을 위한 해시 체인 기반의 경량화 된 상호 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.560-566
    • /
    • 2009
  • A low-power Radio Frequency Identification (RFID) system is an auto-identification technology that reads and writes an information of things without physical contacts using radio frequency. It is unescapable against unlawful modification, eavesdropping, tracking, or privacy of individuals because RFID systems use the radio frequency and RFID tags. Therefore we create a key using hash chain between database and tag and this process can prevent above attacks. Also we support the efficiency of proposed protocol using hash function to abate computation.

A Study on Deep Learning Model for Discrimination of Illegal Financial Advertisements on the Internet

  • Kil-Sang Yoo; Jin-Hee Jang;Seong-Ju Kim;Kwang-Yong Gim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.21-30
    • /
    • 2023
  • The study proposes a model that utilizes Python-based deep learning text classification techniques to detect the legality of illegal financial advertising posts on the internet. These posts aim to promote unlawful financial activities, including the trading of bank accounts, credit card fraud, cashing out through mobile payments, and the sale of personal credit information. Despite the efforts of financial regulatory authorities, the prevalence of illegal financial activities persists. By applying this proposed model, the intention is to aid in identifying and detecting illicit content in internet-based illegal financial advertisining, thus contributing to the ongoing efforts to combat such activities. The study utilizes convolutional neural networks(CNN) and recurrent neural networks(RNN, LSTM, GRU), which are commonly used text classification techniques. The raw data for the model is based on manually confirmed regulatory judgments. By adjusting the hyperparameters of the Korean natural language processing and deep learning models, the study has achieved an optimized model with the best performance. This research holds significant meaning as it presents a deep learning model for discerning internet illegal financial advertising, which has not been previously explored. Additionally, with an accuracy range of 91.3% to 93.4% in a deep learning model, there is a hopeful anticipation for the practical application of this model in the task of detecting illicit financial advertisements, ultimately contributing to the eradication of such unlawful financial advertisements.