• Title/Summary/Keyword: copy right

Search Result 66, Processing Time 0.028 seconds

Analysis and Consideration of Plagiarism Cases to Establish Research Ethics in Korea

  • KWON, Young-Eun;JEON, Ye-Won;KWON, Lee-Seung
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • Purpose: The main purpose of this study is to identify the cause and problem of one plagiarism and suggest a solution. Research design, data and methodology: Based on the Center for Research Ethics Information, this study analyzed the total of 17 cases from October 3, 2017 to June 16, 2020. Results: As seen in the case of this study, the Supreme Court's verdict on plagiarism requires clear sources, whether it is plagiarism or self-plagiarism, and the criterion for plagiarism is the time of writing the work, and the final judgment will be conducted by the court. Evidence-based sources indicate that the researcher or professor provides a lot of anticipation to the academic development and readers who read it. In addition, it is necessary to revise and submit the thesis judge's point of view in the thesis for doctoral dissertation within the proper and reasonable scope. The implications are also very large. Lastly, the reason for dismissal of a doctoral dissertation plagiarized at the time of recruitment is recognized Research ethics should be institutionalized in educational institutions or research institutions. Conclusions: Research ethics education should be strengthened in universities and research institutes. Research ethics is a code of ethics that must be ruled by everyone who explores.

Future of International Space Law in the 21st Century: De Lege Ferenda (21세기 국제우주법의 과제)

  • Kim, Han-Teak
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.185-209
    • /
    • 2003
  • 이 논문은 21세기 우주개발로 인하여 제기되는 국제우주법의 장래 과제를 분석한 것이며 따라서 1967년 우주조약을 비롯한 기존의 5개 국제우주조약들과 '연성법'(soft law)으로서의 우주법인 5개의 UN결의들은 간략하게 소개하고 lex ferenda로서 제기되는 문제들을 중심으로 연구하였다. 21세기 국제우주법의 lex ferenda로 제기되는 문제는 다음과 같다. 첫째. 우주의 정의 및 경계획정문제와 지구정지궤도(GSO)의 성격과 활용의 문제가' 외기권 우주의 평화적 이용에 관한 위원회'(COPUOS)의 법률소위원회를 중심으로 어떻게 진행되고 있는가 하는 문제를 검토하였고, 둘째. 대기권 상공과 외기권 우주를 비행할 수 있는 새로운 우주운송수단으로 등장하고 있는 우주항공기(Aerospace Vehicle)가 기존의 항공법과 우주법의 관계에서 어떠한 법의 적용을 받아야 하는가의 문제를 검토하였다. 셋째. 그리고 통신위성을 이용하면서 발생하는 저작권법(copy right law) 및 지적재산권(intellectual property) 등의 문제 그리고 우주보험을 포함한 우주의 상업적 이용에서 발생하는 법규범의 문제를 검토하였고, 넷째. 우주활동으로 인해 발생하는 우주잔해(space debris)와 우주환경문제를 다루었다. 마지막으로 그리고 기타 국제우주법관련문제 특히 우주활동을 원활하게 수행하기 위한 '우주물체'(space objects)와 그와 관련된 용어들의 정확한 개념 정의를 명확하게 할 필요성과 우주의 상업적 이용과 우주의 오로지 평화적인 목적을 위하여 중요한 역할을 할 국제민간항공기구(ICAO)나 국제해사기구(IMO)와 같은 장래의 국제민간우주기구(International Civil Space Organization) 등의 설립문제를 검토하였다.

  • PDF

An Efficient Application of eBSS DRM Method to eBook Contents based on ePub 3.0 for Smart Device

  • Jun, Eung Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.59-72
    • /
    • 2016
  • DRM(Digital Rights Management) is essential for the copy right protection of eBooks based on ePub 3.0 by IDPF. In this paper, we developed eBSS(eBook Service System) as ePub 3.0 builder and viewer system with DRM and proposed an efficient DRM method which improves the performance of contents generation, security and distribution system. The efficient application of DRM method to the eBook contents based on ePub 3.0 for smart phone is practically useful for eBook service system. It is very useful for the suggested eBSS with DRM method and strategy to apply easily and practically to the encryption and decryption of the eBook contents. Also, it is very efficient to generate the ePub 3.0 contents and to apply DRM method to it especially, by using practically this suggested ePub 3.0 builder system from the view point of the eBook content generation and its viewer such as eBook reader for user and eBook providers.

Dictionary Based Software Watermarking Technique (사전 소프트웨어 워터마크 기술 기반)

  • Pervez, Zeeshan;Lee, Sungyoung;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

A Study on the Gaze Flow of Internet Portal Sites Utilizing Eye Tracking (아이트래킹을 활용한 인터넷 포털사이트의 시선 흐름에 관한 연구)

  • Hwang, Mi-Kyung;Kwon, Mahn-Woo;Lee, Sang-Ho;Kim, Chee-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2022
  • This study investigated through eye tracking what gaze path the audience searches through portal sites (Naver, Daum, Zoom, and Nate). As a result of the layout analysis according to the gaze path of the search engine, the four main pages, which can be called to be the gateway to information search, appeared in the form of a Z-shaped layout. The news and search pages of each site use an F-shape, which means that when people's eyes move from top to right in an F-shape, they read while moving their eyes from left to right(LTR), which sequentially moves to the bottom. As a result of analyzing through the heat map, gaze plot, and cluster, which are the visual analysis indicators of eye tracking, the concentration of eyes on the photo and head copy was found the most in the heat map, and it can be said to be of high interest in the information. The flow of gaze flows downward from the top left to the right, and it can be seen that the cluster is most concentrated at the top of the portal site. The website designer should focus on improving the accessibility and readability of the information desired by the user in the layout design, and periodic interface changes are required by investigating and analyzing the tendencies and behavioral patterns of the main users.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

The Accomplishment and Evaluation of the Policy of Scheduling Outsourcing Broadcasting Programs (외주제작 방송 프로그램 편성 정책의 성과와 평가)

  • Joo, Chungmin;Han, Jinmann;Yoo, Jongwon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.289-298
    • /
    • 2017
  • This study analyzed the accomplishment of the outsourcing production policy which forces broadcasting companies to schedule and broadcast more than a certain proportion of outsourcing production programs. According to the results from the examination of whether or not the policy increased the diversity of broadcasting programs, it is positive that a rise in the number of production companies resulting from the implementation of the outsourcing production policy increased the diversity of broadcasting program makers, but programs supplied were limited to certain genres, failing to be diverse. According to the results from the examination of whether or not the competitiveness of broadcasting and video contents increased, production conditions had not improved due to the controversy over the ownership of the right of production between terrestrial broadcasting companies and outsourcing production companies. In addition, though there was the positive effect of increasing export of broadcasting programs, the exports were limited to certain genres.

A Interoperable Digital Content Protection System Based on DMP (DMP 기반의 상호운용 가능한 디지털 콘텐츠 보호 시스템)

  • Hao, Ri-Ming;Choi, Bong-Kyu;Yoon, Hwa-Mok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.626-629
    • /
    • 2007
  • The digital content was supplied quickly with advancement of video compressive technique and the network. Simultaneously illegal copy and diffuse via Internet, it was caused to necessitate the intellectual property right protection of the digital content. With this background, Various standardization groups and content provision enterprises developed the solution for a digital content protection. But the problem which lack interoperability is appeared, cause of independent development among other equipment. To find solution about this, MPEG(Moving Picture Experts Group) has progressed standardization against IPMP (Intellectual Property Management and Protection) techniques which are possible interoperability. In spite of it, with reason why insufficient function, DMP(Digital Media Project) standard was presented with the alternative against this. In this paper, we analyze MPEG IPMP standards and DMP ToolPack concepts to compare between them, and through these, designed and implemented digital content protection system which possible interoperability.

  • PDF

A Web-based Right Management System Considering Execution time and Security (실행시간과 안전성을 고려한 웹 기반의 저작권관리 시스템)

  • Ko, Il-Seok;Cho, Yong-Hwan;Shin, Seung-Soo;Cho, Do-Eun;Kwon, Yong-Ai
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.697-702
    • /
    • 2004
  • As for the digital content, a reproduction is easy and manuscript is identical with original copy. Because of these characteristics, there are difficulties on prevention of an illegal reproduction and an illegal currency. In recent days various digital content service systems based on a web are commercialized. An appropriate copyright protection technology is required so that these systems develop as a profit model. Generally we use encrypted digital content transmission method for the copyright protection on a web base system. At the time of this, it is increased sire of encrypted digital content. As for this, it be increased time required on an execution process. Therefore, a design of the system that considered a execution time and a security is required. In this study, we designed the digital content transmission system that considered execution time and a security through a partial encryption based on a digital content copyright management technique. Also we evaluated performance of a proposed system through analysis.

A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression (영상압축에 강인한 변질검증 워터마킹에 관한 연구)

  • Ahn, Sung-Cheol;Lee, Kyoung-Hak;Park, Hwa-Bum;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1165-1172
    • /
    • 2006
  • The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.