• 제목/요약/키워드: illegal

검색결과 1,448건 처리시간 0.029초

법적 관점에서 본 P2P서비스:미국연방대법원 평결 및 한국의 소리바다 판결 (Legal View on Recent Cases of the U.S. and Korea on P2P Service)

  • 김은영
    • 통상정보연구
    • /
    • 제8권1호
    • /
    • pp.205-223
    • /
    • 2006
  • File sharing through P2P was decided as illegal according to Supreme Court of the U.S. and the Highest Court of Korea in 2005. Metro-Goldwyn-Mayer Studios Inc. et al. v. Grokster, LTD., et al. and Soribada v. Korea Association for Music Providers have the same ground for decision. P2P service company has vicarious liability for illegal file sharing of its customers. Balance between copyright protection and development of technology was considered in that decision. Programmer who will develop new program for free download and copyright holders who will exploit every measures to protect their right may compromise for their mutual benefits.

  • PDF

농업폐기물 소각에 따른 대기오염 실태 및 위해성 평가 (Risk Assessment and Air Pollution by the Open Burning of Agricultural Waste and Residues)

  • 김문현;양원호
    • 한국환경보건학회지
    • /
    • 제33권1호
    • /
    • pp.30-35
    • /
    • 2007
  • Waste policies with waste metering system and recycling in 1995 have contributed to the reduction of solid waste generation. Now rural areas as well as urban areas produce less amount of solid wastes in terms of per capita. However most policies in relation to waste issue have been concentrated in urban areas. Large portion of agricultural waste in rural region are being illegally treated such as open incineration or burned out on the road. In this study, we assessed the atmospheric air quality and health risk by illegal open incineration in rural region. In case of benzene level, worst concentration during illegal open incineration was 0.23 ppm and cancer risk by exposure was estimated to $2.29{\times}10^{-3}$.

유해정보 선별차단 시스템의 발전방향 (A Development Strategy of Harmful Information Protection System)

  • 이승민;남택용;장종수
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.721-723
    • /
    • 2004
  • 현재 개인용 유해사이트 선별차단 소프트웨어는 기본적으로 등급분류서버의 유해사이트 목록을 이용하는 URL 기반의 필터링 방법을 이용하고 있으며, 일부 제품의 경우에는 이에 추가하여 웹 페이지의 문자와 이미지기반의 내용기반 필터링 방법을 지원하고 있다. 본 논문에서는 유해 사이트 선별차단 소프트웨어를 구성하는 요소기술을 분석함으로써, 현재 운용 중이거나 상용화된 대표적인 유해 사이트 선별차단 시스템 제품 동향을 살펴보고 요소기술별 특징을 비교하기로 한다 이를 통하여, 향후 개인용 유해사이트 선별차단 시스템의 발전방향을 제시하고자 한다.

  • PDF

GStreamer를 이용한 DMP기반의 DRM시스템 (DRM System using GStreamer based on DMP)

  • 박기철;이주영;안상우;남제호;정회경
    • 한국정보통신학회논문지
    • /
    • 제12권3호
    • /
    • pp.445-451
    • /
    • 2008
  • 디지털 미디어의 빠른 기술 발달과 인터넷의 발달로 디지털 콘텐츠는 불법복제와 인터넷을 통한 배포의 피해로 지적 재산권에 대한 보호의 필요성으로 여러 표준화 단체들과 콘텐츠 공급자들이 DRM(Digital Rights Management) 시스템을 개발하였지만, 상호 DRM 시스템간의 상호운용성이 결여되는 문제점이 있다. 본 논문에서는 GStreamer를 사용하고 DMP (Digital Media Project)에서 제안하는 DRM 표준을 기반으로 상호운용 가능한 DRM시스템을 설계 및 구현하였다.

A Legal Study on the Promotion of the In-Flight Security Officers System

  • Jin, Seong Hyun;Jeon, Seung Joon
    • 한국항공운항학회지
    • /
    • 제29권2호
    • /
    • pp.100-105
    • /
    • 2021
  • The purpose of this study is to provide in-flight security in situations where aviation security is constantly threatened by the increase in illegal interference in aircraft and the threat of terrorism that still exists. It is to identify legal operational problems such as education and qualification of the original system and to propose improvement measures. To this end, the need for revision based on relevant laws and guidelines such as "Operation Guidelines for In-Flight Security Officers" is to be discussed based on international standards such as ICAO and Federal Air Marshal. The research method was based on interviews with SEMs such as cabin managers, which focused on ensuring the legal status of In-Flight Security Officer, establishing relationships with captains, and improving education and training.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

전자투표상에서의 부정 행위 방지에 관한 연구 (A Study on Preventing Illegal Acts in Electronic Elections)

  • 박희운;이임영
    • 정보보호학회논문지
    • /
    • 제8권4호
    • /
    • pp.95-110
    • /
    • 1998
  • 정보화 사회를 거치면서 네트워크의 발전과 관련해 많은 응용 분야들이 연구되고 있는데, 그 중에서도 암호학을 이용한 전자 투표의 비중이 증대되고 있다. 이러한 전자 투표는 그 중요성에도 불구하고, 아직까지 취약한 점이 많이 산재해 있다. 특히, 전자 투표를 총괄하는 선거 관리 위원회가 부정을 저지를 경우 투표 자체의 신뢰성은 무너지게 되며, 투표권의 매매가 성립할 경우에는 전자 투표에 있어 치명적인 악영향을 미치게 된다. 따라서 본 논문에서는 기존의 투표를 전자 투표로 적용시키는 과정에서 어떠한 요소들이 필요한지 확인해 보고, 선거 관리 위원회의 부정 방지 및 투표 매매 방지를 위한 요구 조건을 살펴볼 것이다.그리고 기존의 전자 투표 방식들이 이러한 위협 요소들에 대해 어떻게 대처하고 있는지를 고찰한 뒤에 더욱 효율적이고 안전한 전자 투표 방식을 제안한다.

Finding Loopholes in Sanctions: Effects of Sanctions on North Korea's Refined Oil Prices

  • KIM, KYOOCHUL
    • KDI Journal of Economic Policy
    • /
    • 제42권4호
    • /
    • pp.1-25
    • /
    • 2020
  • The international community's sanctions against North Korea, triggered by North Korea's nuclear tests and by missile development in the country, are considered the strongest sanctions in history, banning exports of North Korea's major items and limiting imports of machinery and oil products. Accordingly, North Korea's trade volume decreased to the level of collapse after the sanctions, meaning that the sanctions against North Korea were considered to be effective. However, according to this paper, which analyzed the price fluctuations of refined petroleum products in North Korea through the methodology of an event study, the market prices of oil products were only temporarily affected by the sanctions and remained stable over the long run despite the restrictions on the volumes of refined petroleum products introduced. This can be explained by evidence that North Korea has introduced refined oil supplies that are not much different from those before the sanctions through its use of illegal transshipments even after the sanctions. With regard to strategic materials such as refined oil, the North Korean authorities are believed to be desperately avoiding sanctions by, for instance, finding loopholes in the sanctions to meet the minimum level of demand.

URL Filtering by Using Machine Learning

  • Saqib, Malik Najmus
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.275-279
    • /
    • 2022
  • The growth of technology nowadays has made many things easy for humans. These things are from everyday small task to more complex tasks. Such growth also comes with the illegal activities that are perform by using technology. These illegal activities can simple as displaying annoying message to big frauds. The easiest way for the attacker to perform such activities is to convenience user to click on the malicious link. It has been a great concern since a decay to classify URLs as malicious or benign. The blacklist has been used initially for that purpose and is it being used nowadays. It is efficient but has a drawback to update blacklist automatically. So, this method is replace by classification of URLs based on machine learning algorithms. In this paper we have use four machine learning classification algorithms to classify URLs as malicious or benign. These algorithms are support vector machine, random forest, n-nearest neighbor, and decision tree. The dataset that is used in this research has 36694 instances. A comparison of precision accuracy and recall values are shown for dataset with and without preprocessing.

딥러닝 영상인식을 이용한 쓰레기 무단투기 단속 시스템 개발 (Development of monitoring system for detecting illegal dumping using deep learning)

  • 배창희;김형준;여정훈;정지훈;윤태진
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2020년도 제62차 하계학술대회논문집 28권2호
    • /
    • pp.287-288
    • /
    • 2020
  • 우리나라의 무단 투기된 쓰레기양은 2019년 2월 기준 33만 톤이며 이를 단속하기 위해 상용화된 쓰레기 무단투기 단속 시스템은 센서를 이용하여 시스템 주변에 사람이 지나가면 영상을 촬영하기 때문에 쓰레기 무단투기자 뿐 아니라 해당 시스템 주변을 지나는 모든 사람을 촬영하기 때문에 불법 쓰레기를 배출하는지 해당 영상을 사람이 일일이 다시 분석해야한다. 본 논문에서는 쓰레기 투기 행위 이미지를 바탕으로 학습시킨 딥러닝 실시간 객체인식 알고리즘인 YOLO-v4를 활용하여 실시간으로 쓰레기 무단투기를 단속하는 시스템을 제시한다.

  • PDF