• Title/Summary/Keyword: computer abuse

Search Result 88, Processing Time 0.022 seconds

Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet

  • Azab, Rania S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.424-435
    • /
    • 2022
  • When the owners of the intellectual property rights of digital content have lost control over it in the digital environment, there emerged fears that the intellectual property laws, especially copyright law, would not be effective as in the material (Offline ) world. The reason is that the digital environment helps to reproduce copies in high quality and at almost no cost, while copyright law protection has been limited to programs embedded in CDs. According to copyright laws, the owner of the program did not have the right to prevent buyers of the initial physical copy of the program from copying and reselling it to more than one individual without the permission of the original owner. As a result, business owners have invented the idea of licensing digital content and programs instead of selling them. They set out terms that serve their commercial interests regardless of their abuse to intellectual property laws or even the rules of the traditional contract to sell a material property. The abuse has resulted from the way those terms are concluded and the heavy rules that are unfair to consumer rights. Therefore, business owners insisted on dealing with the website and its programs and digital content as material property. Here raises the question of whether the website and its digital content are subject to the protection of copyright law or the rules of the traditional contract or licensing contracts. As the answer to this question affects the protection of consumer rights, is it possible to find a balance between it and the protection of the owners of digital programs' rights.That is what we will discuss in this paper.

Response to SSL communication abuse cases by DNS service providers (DNS 서비스 제공자의 보안접속 악용 사례와 대응)

  • Go, Namhyeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.107-108
    • /
    • 2022
  • 오늘날 도메인 네임 시스템(DNS) 서비스는 단순히 IP 주소를 .com, .net 등의 도메인으로 변환해주는 기능을 넘어 컨텐츠 가속(CDN) 서비스, 고가용성(HA) 서비스, 분산 서비스 거부공격(DDoS) 방어 서비스, 통신 구간 암호화 서비스로서 그 용도를 넓혀가고 있다. 이용자들은 이러한 업체가 외부 기관에 정보를 넘기지 않고, 모든 통신 구간은 서비스 업체도 그 내용을 들여다보지 못할 정도로 철저히 암호화한다는 도덕적인 영업과 운영을 할 것으로 기대하지만, 실제 사례를 살펴보면 그렇지 못하다는 점이 드러난다. 본 논문에서는 2021년 기준으로 최소 7년간 이어져온 것으로 추정되는 유명 DNS 서비스 업체의 보안접속 악용 사례를 중심으로 이러한 악용이 어떻게 이루어지고 이것에 대응하기 위해 사용할 수 있는 표준화 기술은 이 문제에 효용성이 있는지를 DNS 업체와 동일한 실제 환경 구성을 통해 검증하였다.

  • PDF

Development of a Web-based Education Program for Nurses working in Nursing Homes on Human Rights of Older Adults (노인요양시설 간호사 대상 웹기반 노인인권 교육프로그램 개발)

  • Kim, Ki-Kyong
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.4
    • /
    • pp.463-472
    • /
    • 2010
  • Purpose: This study was done to develop a web-based education program for nurses working in nursing homes. The focus was on the rights of older adults. Methods: The program was designed based on the Network-Based Instructional System Design (NBISD) model and was operated and evaluated between July 2007 and June 2008. Results: Out of nursing records of 40 residents from a nursing home, the final 7 cases were deducted through classification using the Resource Utilization Group (RUG)-III. The data on needs for education was collected from 28 nurses working in 15 nursing homes located in Seoul and Gyeonggi Province, who agreed to complete a self-report questionnaire. A comprehensive review of the literature and two focus groups interviews were used to search for risk factors and guidelines for protection of human rights. The education program was developed based on Kolb's experiential learning model and composed of 5 units, which included content on types of human rights and rights to death with dignity, elder abuse, physical liberty, and self-determination. The program was positively evaluated showing a score of 3.35 (SD=0.37) out of 4. Conclusion: The educational program developed in this study should promote nurses' sensitivity to the rights of elders and improve nurses' behaviors in protecting the rights of elders residing in nursing homes.

Wireless Intrusion Prevention System based on Snort Wireless (Snort Wireless 기반의 무선 침입 방지 시스템)

  • Kim, A-Yong;Jeong, Dae-Jin;Park, Man-Seub;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.666-668
    • /
    • 2013
  • Wireless network environment is spreading due to the increase of using mobile devices, causing wireless network abuse. Network security and intrusion detection have been paid attention to wireless as well as wired existing and studied actively Snort-based intrusion detection system (Intrusion Detection System) is a proven open source system which is widely used for the detection of malicious activity in the existing wired network. Snort Wireless has been developed in order to enable the 802.11 wireless detection feature. In this paper, Snort Wireless Rule is analyzed. Based on the results of the analysis, present the traveling direction of future research.

  • PDF

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

Abusive Sentence Detection using Deep Learning in Online Game (딥러닝를 사용한 온라인 게임에서의 욕설 탐지)

  • Park, Sunghee;Kim, Huy Kang;Woo, Jiyoung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.13-14
    • /
    • 2019
  • 욕설은 게임 내 가장 큰 불쾌 요소 중 하나이다. 지금까지 게임 사용자들의 욕설을 방지하기 위해서 금칙어를 기반으로 필터링 해왔으나, 한국어 특성상 단어를 변형하거나 중간에 숫자를 넣는 등 우회할 방법이 다양하기 때문에 효과적이지 않다. 따라서 본 논문에서는 실제 온라인 게임 'Archeage'에서 수집된 채팅 데이터를 기반으로 딥러닝 기법 중 하나인 콘볼루션 신경망을 사용하여 욕설을 탐지하는 모델을 구축하였다. 한글의 자음, 모음을 분리하여 실험하였을 때, 87%라는 정확도를 얻었다. 한 글자씩 분리한 경우, 조금 더 좋은 정확도를 얻었으나, 사전의 수가 자소를 분리한 경우보다 10배 이상 늘어난 것을 고려해보면 자소를 분리한 것이 더 효율적이다.

  • PDF

A Lattice-Based Role Graph Security Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 격자개념의 역할그래프 보안 모델)

  • Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.91-98
    • /
    • 2009
  • In this paper, this model ensures confidentiality and integrity of mandatory access cotrol policy which based on fuzzy function with importance of information. And it solves authorization abuse problem through role graph creation algorithm and flowing policy that security grade is applied. Because this model composes role hierarchy which bind similar role concept to apply to commercial environment, it has expansile advantage by large scale security system as well as is easy that add new role.

Smart Medication Case (만능 스마트 약통)

  • Lee, Juwon;Go, ShinJee;Choi, Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.339-340
    • /
    • 2021
  • 한 첩씩 복용하는 알약은 복용 여부를 정확히 판별하기 어렵다. 그래서 이러한 상황에서 벗어나고자 만든 스마트 약통을 제안하고 있다. 이 스마트 약통은 약의 오남용을 방지하고, 날짜별 복용 여부를 휴대폰 어플로 알려주는 장점을 가지고 있다. 장기간 복용하는 약은 한 번의 내원으로 많은 양의 약을 처방받아 오기 때문에 기억력이 좋지 않은 어른이 사용하기에 유용하다. 처방 받은 약통에 있는 QR코드를 최초 입력함으써 약 3일 정도의 데이터 수집기간을 통해 평균 복용시간을 인식하고, 평균 복용시간을 인식한 후에 약 먹을 시간을 알려주는 기능을 탑재하였다. 평상시에는 잠금장치를 통해 걸어 열 수 없게 프로그램을 설정하고, 복용시간에만 잠금장치를 해제하여 환자의 약물 오남용을 막고 안전하게 복용할 수 있을 것이다.

  • PDF

A Study on the Actual Condition of Abuse in PVP Game (PVP 게임에서 어뷰징 실태에 관한 연구)

  • Kim, Jae-Un;Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.649-652
    • /
    • 2020
  • 본 논문에서는 스타크래프트 게임이나 리그 오브 레전드 게임 등의 이용자끼리 실력을 겨루는 PVP 형태의 온라인 게임들에서 일어나는 어뷰징에 대해서 실태를 조사하고 이에 따른 개선 방안을 제시한다. 어뷰징에 관하여 알아보고 어뷰징이 게임과 일상에서 어떻게 작용하는지 설명하고 유저들이 어뷰징으로 인한 피해를 입는 사례를 조사하고 현재 개발사들의 조치 방안 및 유저 커뮤니티의 의견 등을 통해 실태에 대해 내용을 제시한다. 결론으로 조사한 자료를 바탕으로 어떻게 하면 어뷰징을 좀 더 방지할 수 있는지에 대한 개선 방안을 제시하고 게임 운영 차원에서 어떤 방식으로 지원해야 하는지를 제시한다.

  • PDF

Permission Inheritance Expression with Role Hierarchy of RBAC (역할기반 접근통제에서 역할 계층에 따른 접근권한 상속의 표현)

  • Lee, Sang-Ha;Jo, In-Jun;Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2125-2134
    • /
    • 2000
  • RBAC(Role Based Access Control) has the advantage that reflects the real world because it presents a basic access control model based on user's role in organizations or governments. But in RBAC model, the privileges of the senior roles in these hierarchies are inherited from those of the junior roles, so RBAC model has the privileges problem that he senior are given more privileges than they need. That is, it tends to infringe the Principle of Least Privilege. On the other hand, if we give some excessive constraints on the RBAC model without scrupulous care, it may be meaningless property of role hierarchies. Furthermore, such complicated constraints make it more difficult to mange resources and roles in huge enterprise environments. The purpose of this paper is to solve the problems of role hierarchies such as inefficient role managements and abuse of privileges by using newly presented the backward tag pointer path expression in the inheritance of privileges.

  • PDF