• Title/Summary/Keyword: illegal

Search Result 1,457, Processing Time 0.028 seconds

A Study on the Current Status and Improvement of Advertising on the Copyright Infringement Websites (저작권 침해 웹사이트 내 광고 현황과 개선방안에 관한 연구)

  • Hwang, Jang-Sun;Kim, Woon-Han;Ji, Won-Bae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.83-90
    • /
    • 2020
  • Recently, a growing number of copyright infringement websites have illegally copied and posted works such as broadcasting, movies and music, and posted advertisements to make profits. The research is aimed at finding solutions by analyzing the current status of advertisements on copyright infringement websites. The results of this study are as follows. First of all, there are many advertisements harmful to teenagers, such as casinos, betting, games, adult products, and adult meeting, which is necessary to deal with. Secondly, there were many unethical advertisements on copyright infringement websites, but there were also many advertisements from famous companies. Advertisements from large companies and famous brands are also being executed continuously, which can create trust in illegal sites. Therefore, the government, advertisers, citizens, and academia should participate in a campaign to root out the use of illegal websites because it is impossible to eradicate them by crackdown alone. In this paper, we pointed out the practical problems of advertising execution, the main source of revenue for copyright infringement websites, and presented a comprehensive solution.

The Study on the Analyzing Factors to Resolve Problems of Jejusi Residential Parking Permit Program (제주시 거주자우선주차제 문제해결 요소 탐색에 관한 연구)

  • Hwang, Gyeong-Su;Im, Su-Gil
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.6
    • /
    • pp.97-106
    • /
    • 2009
  • The purpose of this study is to analyze factors for resolving problems of Jejusi Residential Parking Permit Program and to draw up a plan by examining Jejusi case. This program was started by way of showing an example in October, 2005, and then has been put in practice in the heart of Jejusi since October, 2007. Jejusi government introduced this system to prevent all kinds of accidents by the indiscreet parking near the residental street and to guarantee the rights to live comfortably by encouraging a pleasant parking environment. As the result of the survey which is about residents' participation from the process of decision-making, the answers such as "Should Participate" and "Surely should participate" are at the high rate of 87.5 percent. A matter of the utmost importance is that this system should be reformed to make the visitors pay parking if they want to park near there. Almost 36 percent of the respondents have a negative opinion, and this is because they consider their visitors. Especially the important factors from the Logistic Regression Analysis are that the government should exercise stricter control over illegal parking, that the system should be improved for the visitors to pay parking, and that the government should support the declining sales of the shops near shopping streets. The suggestions are as follows. First, the government should enforce on reducing the illegal parking. Second, they should secure the parking lots for visitors. Third, they should minimize the impact on the declining sales of the shops near shopping streets.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

Algorithm of Generating Adaptive Background Modeling for crackdown on Illegal Parking (불법 주정차 무인 자동 단속을 위한 환경 변화에 강건한 적응적 배경영상 모델링 알고리즘)

  • Joo, Sung-Il;Jun, Young-Min;Choi, Hyung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.117-125
    • /
    • 2008
  • The Object tracking by real-time image analysis is one of the major concerns in computer vision and its application fields. The Object detection process of real-time images must be preceded before the object tracking process. To achieve the stable object detection performance in the exterior environment, adaptive background model generation methods are needed. The adaptive background model can accept the nature's phenomena changes and adapt the system to the changes such as light or shadow movements that are caused by changes of meridian altitudes of the sun. In this paper, we propose a robust background model generation method effective in an illegal parking auto-detection application area. We also provide a evaluation method that judges whether a moving vehicle stops or not. As the first step, an initial background model is generated. Then the differences between the initial model and the input image frame is used to trace the movement of object. The moving vehicle can be easily recognized from the object tracking process. After that, the model is updated by the background information except the moving object. These steps are repeated. The experiment results show that our background model is effective and adaptable in the variable exterior environment. The results also show our model can detect objects moving slowly. This paper includes the performance evaluation results of the proposed method on the real roads.

  • PDF

Illegal Cash Accommodation Detection Modeling Using Ensemble Size Reduction (신용카드 불법현금융통 적발을 위한 축소된 앙상블 모형)

  • Lee, Hwa-Kyung;Han, Sang-Bum;Jhee, Won-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.93-116
    • /
    • 2010
  • Ensemble approach is applied to the detection modeling of illegal cash accommodation (ICA) that is the well-known type of fraudulent usages of credit cards in far east nations and has not been addressed in the academic literatures. The performance of fraud detection model (FDM) suffers from the imbalanced data problem, which can be remedied to some extent using an ensemble of many classifiers. It is generally accepted that ensembles of classifiers produce better accuracy than a single classifier provided there is diversity in the ensemble. Furthermore, recent researches reveal that it may be better to ensemble some selected classifiers instead of all of the classifiers at hand. For the effective detection of ICA, we adopt ensemble size reduction technique that prunes the ensemble of all classifiers using accuracy and diversity measures. The diversity in ensemble manifests itself as disagreement or ambiguity among members. Data imbalance intrinsic to FDM affects our approach for ICA detection in two ways. First, we suggest the training procedure with over-sampling methods to obtain diverse training data sets. Second, we use some variants of accuracy and diversity measures that focus on fraud class. We also dynamically calculate the diversity measure-Forward Addition and Backward Elimination. In our experiments, Neural Networks, Decision Trees and Logit Regressions are the base models as the ensemble members and the performance of homogeneous ensembles are compared with that of heterogeneous ensembles. The experimental results show that the reduced size ensemble is as accurate on average over the data-sets tested as the non-pruned version, which provides benefits in terms of its application efficiency and reduced complexity of the ensemble.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Study on the legal system to trace the bycaught whale and dolphin meat in the market (혼획 고래 유통 이력 추적을 위한 제도 개선 방안 연구)

  • Sohn, Hawsun;Hong, Boga;Kim, Min Ju;Kim, Suyeon
    • Ocean policy research
    • /
    • v.33 no.2
    • /
    • pp.183-204
    • /
    • 2018
  • Whaling has been banned in Republic of Korea after the declaration of the moratorium on the commercial whaling by the International Whaling Commission (IWC) since 1986. Korean government followed the moratorium immediately. However whale meat market has been kept by the bycaught whales and dolphins. So Korean government established a rule to control and trace whale meat in the market in 2011. The rule has some loopholes to allow illegally taken whale meat smuggle into the market. This study investigates the flaws in the current rule and recommend the way to overcome that defects. The first step is to prevent the entry of the illegal whale meat into the market. Minor change of the current law would be a solution. The next measure is to increase the sampling rate of the whale DNA that allowed to distribute in the market. The DNA database would be a powerful tools to identify illegal whale meat which is existing in the market. Korean government is operating three kind of food traceability systems. However, because of the legal limitations and the opposition of the non-governmental animal rights organizations, it is difficult to include whale meat to the existing systems. So the last step is to establish a new Traceability System with a state-of-the-art IT technology like as blockchain. The three measures mentioned above would increase the transparency in the whale meat market and prevent the entry of the illegal products.

Comparison of Void Content between Cyldrical Concrete Specimen and Concrete Core Specimen Using ASTM C 642 Test Procedure (ASTM C 642 시험방법을 이용한 구조체 코어공시체와 원주형 공시체의 공극률 비교 평가)

  • Son, Joeng Jin;Kim, Ji-Hyun;Chung, Chul-Woo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.6
    • /
    • pp.631-640
    • /
    • 2022
  • Recently, construction accidents have occurred due to illegal water addition and insufficient quality control at domestic construction sites. In this study, the void content test method proposed in ASTM C 642 was used to provide a reference guideline for evaluation on the quality control status of cast-in-place structural concrete. For this purpose, simulated structural concrete for coring purpose was prepared in addition to the concrete cylindrical specimens with the same formulation, and the changes in compressive strength, elastic modulus, and void content related to coring were evaluated. According to experimental results, the compressive strength and modulus of elasticity were reduced by coring, which was associated with the generation of microcracks during coring. With respect to void content, the difference in void content between the cylindrical specimen and the cored specimen was up to 1.69%. If this value is used as a correction factor, it is possible to estimate the real void content of the cast-in-place structural concrete. By comparing this with the void content obtained from cylindrical concrete specimens, it is possible to evaluate the quality control status and amount of illegal water addition on the structural concrete.

Need to Reduce Industrial Accidents through the Introduction of an Prevailing Wage System (적정임금제 도입을 통한 산업재해 감축 필요성 고찰)

  • Choonhwan Cho;Yeoncheol Shin;Kyung-Bo Han
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • In order to carry out construction work, it is urgent to introduce a proper wage system so that the cost burden of projects that have been won due to bleeding competition among original government buildings based on low-priced bids can be transferred to subcontractors. Purpose: Construction with illegal multi-level industrial structure needs to improve the wage reduction environment leading to order (100%) → original contractor (80%) → subcontractor (65%) → load contractor (65%) and aims to ensure wages for end workers. Method: Investigate the current status of labor cost appropriate payment plan in the construction industry, and investigate the case of the appropriate wage system (P.W) in the United States. In addition, the effect and direction of the appropriate wage system are presented. Result: Individual minimum wage security was also mentioned in the Constitution, and many researchers suggested that only the introduction of an appropriate wage system could solve the problem of reducing worker labor and ensure quality and safety. Conclusion: The proper wage system in the construction industry will block illegal multi-level and illegal foreign work, improve the labor environment in the construction market, create an influx of young workers, and have a significant impact on the construction industry's competitive structure, safety, and quality.

Different Abortion Approaches in Europe and Women's Health: Implications for Korean Abortion Debates (유럽 각국의 낙태 접근과 여성건강 - 한국 낙태논쟁에 대한 함의 -)

  • Chung, Jin-Joo
    • Issues in Feminism
    • /
    • v.10 no.1
    • /
    • pp.123-158
    • /
    • 2010
  • For the last several months, abortion debates have sparkled in Korea. The government has escalated the need of active punishment of illegal abortions to solve low fertility problems, while some obstetricians and gynecologist have proclaimed stoppage of illegal abortions suing colleague doctors who has conducted illegal abortions. Women's rights groups and researchers have also responded to the abortion debate claiming that women's decisions over their pregnancy are important in making of abortion policies. To contribute to Korean abortion debates, his paper aims to analyze European experiences of abortion polices in relation to the consequences on women's health. For the analysis of European abortion experiences, three countries - Ireland, U.K, and Netherland -are chosen. These three countries are selected since their legal and social acceptance of abortion and the level of safe abortion system are different. Each country is reviewed by national abortion policy, legal regulation, medical system and the role of civil society. The analysis shows several implications for abortion debates occurring in Korea. Various systematic policy mechanisms - abortion on women' request, abortions without complicated doctor's referrals, transparent and anonymous counseling and information provision regarding abortion, training and education for medical professionals to guarantee high quality abortion, abortions funded publicly for women to improve their access to abortions, steady monitoring and auditing abortion procedures and outcomes for safe abortion and so on - are required in Korean society. Two track procedures - safe abortion on women's request and prevention of unwanted pregnancy - are needed for reproduction of healthy women and society.