• Title/Summary/Keyword: illegal

Search Result 1,457, Processing Time 0.03 seconds

Comparisons of the Awareness of Domestic and Foreign Users for Illegal Downloading of Movie Content (영상 컨텐츠 불법복제에 관한 국내외 의식 수준 비교 연구)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.297-309
    • /
    • 2012
  • The MPAA(Motion Picture Association of America) warned about serious problems of piracy due to nearly a quarter of all Internet traffic around the globe was related to Internet piracy. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Our study becomes a motivation to consider about seriousness of piracy by comparing between Korea and foreign cases. To our surprise, the survey reveals that Korean netizens conspicuously aware of their downloading behaviors outpaces Canadian netizens. Canada lacks the basic protections for the digital environment and is a safe haven for Internet pirates.

The provision of neutral program and limit of criminal liability (가치중립적 프로그램의 제공과 형사책임의 한계)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.13-21
    • /
    • 2014
  • The problem of the cases of Soribada and Winny is their duplexity that they could be used legally and illegally. The issue called 'The crime of aiding through the neutral behavior' is about whether the program developer who shared the file sharing program letting unspecified public infringe the copyright could be punished or not. Many theories about limiting the traditional scope of punishment of aider have been maintained. However, it is questionable whether it is possible to limit the scope of punishment following the former cases and theories even for the action that is causal and facilitates the principal's criminal conduct, like the aid through the neutral action which is hard to perceive as illegal aid because of its characteristics. Therefore, using the case of Soribada in Korea and the case of Winny in Japan as the examples of illegal aid through neutral behavior case, this paper examines the characteristics and problems of aid through existing theories and cases, and suggests new scope of punishment limitation standard through the elaboration of the action of aid and judgment of degree.

Design and Implementation of Wire and Wireless Integrated System for Residential Parking Permit Program (거주자우선주차제를 위한 유.무선 통합시스템의 설계 및 구현)

  • Lee, Sang-Soon;Lee, Byoung-Soo
    • Journal of IKEEE
    • /
    • v.8 no.2 s.15
    • /
    • pp.224-232
    • /
    • 2004
  • Because vehicles increases very rapidly by elevation of people living standard since 1995 years, become parking space of residential street poorly and most vehicles is doing unlawfulness parking to two faces road. So, was placed popular enmity and administration's difficulty by operation of system that have been enforcing Resident Priority Parking System in each ward office since 1996 years, but is not computerized. In this paper examines about GIS technology, wire and wireless communication technology, character recognition technology etc. that is base technology necessary to Design and Implementation Wire and Wireless Integrated System for Resident Priority Parking System. Explain main process, That is registration, assignment, control, traction process. And see execution appearance of implementation system. Operation of integrated system is considered very rapidly regulation illegal parking and Illegal parking expect on the decrease.

  • PDF

Continuity of North Korean Defectors and Strategies for North Korean Human Rights (탈북자의 지속과 북한인권개선 방안)

  • Kim, Joo-Sam
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.85-108
    • /
    • 2017
  • This study speculated on a continuous issue of North Korean defectors and strategies to improve North Korean human rights. North Korean defectors have immigrated to South Korea continuously since the late 1990s. Their immigration was motivated by low financial status in the harsh marching period of North Korea until the mid-1990s. However, the defection motives changed like this: planned defection, family-based group defection and future-oriented defection. The North Korean defectors had had severe human rights abuses as illegal immigrants in the blind spots of human rights of China and the third nations until they were admitted to South Korea after defection. Although South Korea tried to help them consistently both in public and private ways, it was not satisfactory. Therefore, the government and private sectors should pay more consistent attention to the human rights issue. As the National Assembly passed the North Korean Human Rights Act on March 2016, the government should recognize the issue of North Korean defectors as that of universal value and a national issue, and cooperate each other nationally and internationally in diverse ways.

A Study on Copyright Protection Method of Web Image Contents (웹 이미지 콘텐츠 저작권보호 방법에 관한 연구)

  • Yi, Yeong-Hun;Cho, Man-Gi;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2015
  • Technical treatments of image contents on the web include the copy protection method such as the image capture protection technology and the traitor tracing method to detect unauthorized duplications through watermarking insertion or feature information technology. However, these two methods have their own weaknesses. The image capture protection method is unable to protect illegal captures when the URLs of image sources are exposed. The traitor tracing method is fundamentally unable to protect illegal captures due to its post-treatment method. Besides, the weakness of using the copyright information display technology involves easy removal of copyright information from copyrighted contents. This paper suggests a model of the web image contents protection system which makes it hard to separate copyright information from web image contents and allows image contents to be shown only in the authorized websites.

A Study on the Vocational Ethics of Security and Secretary Service (전문경호비서의 직업윤리에 관한 연구)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.55-78
    • /
    • 2007
  • Currently, the departments related to security and secretary service exist in 18 universities and 30 colleges in Korea in order to raise professional security and secretary personnel. Among the 18 four-year colleges in Korea, only two of them have the ethics course include in their curriculum. Also, among the 31 two-year colleges, only three of them have the ethics course included in their curriculum. Besides, as some private security and guardian companies were recently utilized in illegal actions of the rich and ruling class, contradicting their original purpose of existence, many people point out their downfall as a ?forced private army.? As a professional job, if security secretaries take advantage of the knowledge and top-secret technologies and use them for non-ethical purposes, the effect of the damage is far more serious than other fields of jobs. Therefore, taking this event as a turning point, the contract contents and the task area between the client and the security and secretary company must become more transparent in order to prevent illegal actions, and also for the people working in the security and secretary service area, it is necessary to establish a firm ethical consciousness in order to behave appropriately in their working environment. Therefore, this study examines the proper direction of work ethics of the people working in the security and secretary service according to the professionalization of their field, and also aims to propose an appropriate work ethic system such that they will not become an unfortunate victim of various scandals anymore. To do so, the concept of work ethics in professional jobs was examined; and after the code of ethics that reflect the ethical value system of each professional job was reviewed, the study suggested a specific solution for establishing the codes of ethics for security and secretary service.

  • PDF

Efficient Similarity Measurement Technique of Windows Software using Dynamic Birthmark based on API (API 기반 동적 버스마크를 이용한 윈도우용 소프트웨어의 효율적인 유사도 측정 기법)

  • Park, Daeshin;Jie, Hyunho;Park, Youngsu;Hong, JiMan
    • Smart Media Journal
    • /
    • v.4 no.2
    • /
    • pp.34-45
    • /
    • 2015
  • The illegal copy of Windows software is one of the problems, because Windows is the most popular operating system in the country. The illegal copy can be infringe a software copyright, and software birthmark is one of solutions which is protecting software copyright. Software birthmark is a technique to distinguish software piracy using feature information from software. The type of software birthmark can be differentiated between static birthmark and dynamic birthmark through an extraction method. Static birthmark and dynamic birthmark have strengths and weaknesses. In this paper, we propose similarity measurement technique using dynamic birthmark based on API, and we explain extraction process of dynamic birthmark. In addition, we have verified that the proposed similarity measurement technique meet resilience and credibility through experiment. Furthermore, we saw that proposed measurement technique better than existing measurement technique.

Classifying Windows Executables using API-based Information and Machine Learning (API 정보와 기계학습을 통한 윈도우 실행파일 분류)

  • Cho, DaeHee;Lim, Kyeonghwan;Cho, Seong-je;Han, Sangchul;Hwang, Young-sup
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1325-1333
    • /
    • 2016
  • Software classification has several applications such as copyright infringement detection, malware classification, and software automatic categorization in software repositories. It can be also employed by software filtering systems to prevent the transmission of illegal software. If illegal software is identified by measuring software similarity in software filtering systems, the average number of comparisons can be reduced by shrinking the search space. In this study, we focused on the classification of Windows executables using API call information and machine learning. We evaluated the classification performance of machine learning-based classifier according to the refinement method for API information and machine learning algorithm. The results showed that the classification success rate of SVM (Support Vector Machine) with PolyKernel was higher than other algorithms. Since the API call information can be extracted from binary executables and machine learning-based classifier can identify tampered executables, API call information and machine learning-based software classifiers are suitable for software filtering systems.

A Study on the Establishment of a Aquaculture Farm Facility Management System Using IP-RFID (IP-RFID를 이용한 양식장 시설물 관리시스템 구축방안에 관한 연구)

  • Choi, Hyung-Rim;Park, Byoung-Kwon;Park, Yong-Sung;Lee, Chang-Sup;Choi, Ki-Nam
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2010.04a
    • /
    • pp.26-27
    • /
    • 2010
  • Illegal aquaculture farms that cause marine pollution and ship accidents are managed and controlled by local organizations, but they experience many difficulties due to the vast waters and insufficient human resources. This study aims to utilize new IP-RFID technology to propose an efficient aquaculture farm facility management system This system attaches Ip-Tags to aquaculture farms that can provide facility information and location in real-time through IP communications. This allows for efficient management of facilities and the restriction of illegal farms. This system can also provide locations of farm facilities that sink to the ocean floor, reducing marine pollution caused by lost farms.

  • PDF

HoloMarking: Digital Watermarking Method using Fresnel Hologram (홀로마킹: Fresnel 홀로그램을 이용한 디지털 워터마킹 기법)

  • Choi, Hyun-Jun;Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.604-610
    • /
    • 2009
  • This paper propose a digital watermarking method for digital contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm insert a watermark(digital hologram) by generated using Fresnel transform which improve the robustness. The inserting positions of the watermark choose by considering the frequency property of an image and a watermark. Also the amount of watermarking for watermark bit decide by considering the level of 2DDWT. This algorithm was implemented by C++ and experimented for invisibility and robustness with optical system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than 15%, which is enough in robustness against the attacks.