• Title/Summary/Keyword: illegal

Search Result 1,448, Processing Time 0.023 seconds

Consumers' Non-Ethics Behaviors Depending on their Demographic Characteristics (소비자 특성에 따른 소비자 비윤리 행동)

  • Kim, Jung-Hoon
    • Korean Journal of Human Ecology
    • /
    • v.13 no.3
    • /
    • pp.417-423
    • /
    • 2004
  • The purpose of this study was to compare the consumers' ethics depending on consumers' characteristics. From the exploratory factor analysis, consumers' ethics were composed of four sub-factors such as actively benefiting from non-ethic behavior, actively benefiting from illegal behavior, benefiting from passively illegal behavior, and benefiting from others' costs. As results of this study, followings were found: 1) non-city residents, females, and 20's aged group tended to be more non-ethical rather than city residents, males and other aged group, respectively. 2) Group of middle school education tended to behave actively illegal compared with that of the graduate school education. 3) Religious values influenced on consumers' ethics. 4) While the lower income group tended to be actively benefiting more from non-ethic behaviors, the upper income group from actively illegal ones.

  • PDF

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae;Ki, Jang Geun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.289-296
    • /
    • 2020
  • Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.

A New Scheme Based On Multiple Antennas For Tracking Illegal Small Drones (다중 안테나 기반의 불법 소형 드론 추적 성능 개선 기법)

  • Kim, Ryun Woo;Ryu, Jong-Yeol;Ban, Tae Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.1000-1003
    • /
    • 2021
  • In this paper, we investigate how to track illegal drones by using communication signal received from illegal drones, which is a promising candidate position tracking scheme for anti-drone systems, and is particularly effective in tracking small illegal drones in urban areas. We propose an enhanced tracking scheme using multiple antennas to improve the performance of tracking by reducing the error of position tracking. In the proposed tracking scheme, a tracker is equipped with four receive antennas that are evenly spaced 90 degrees apart, and received signal strength indicators (RSSIs) received by four receive antennas are pre-averaged before being used to calculate the distance between tracker and target. Our numerical results show that the proposed scheme outperforms the conventional scheme in terms of accuracy.

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

Detection, Identification and Surveillance System Development of Illegal Fishing Vessels in Inshore Fishing Ground (연안 어장에서의 불법 조업 어선의 탐지, 식별 및 감시 시스템 개발)

  • LEE Dae-Jae;KIM Kwang-Sik
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.37 no.4
    • /
    • pp.337-344
    • /
    • 2004
  • A real-time surveillance system of the inshore fishing ground was constructed to identify and detect discrete targets, such as illegal fishing vessels. This paper describes measurements made with a combination of sensors, such as radar, CCTV camera, and GPS receivers, for monitoring the fishing activity of small vessels within the fishing limit zones of the inshore waters. The CCTV camera system was used to confirm detection and to classify the type of target. The location of legal vessels distributed in coastal waters was acquired from each GPS system of ships connected to commercial satellite communication network. The surveillance system was networked via LAN to one host PC with the use of electronic navigational charts (ENC) and a radar link. Radar Target Extractor (RTX) for radar signal processing can be remotely accessed and controlled on existing PC via the internet, from anywhere, at any time. Results are presented that demonstrate the effectiveness of the newly constructed fisheries monitoring system for conducting continuous surveillance of illegal fishing vessels in the inshore fishing ground. The identification of illegal fishing vessels was achieved by comparing radar positions of illegal fishing vessels exceeding the warning limits in the surveillance area with GPS position reports transmitted from legal fishing vessels, and the illegal fishing vessels were marked with red symbols on the ENC screen of a PC. The methods to track the activities of all vessels intruding or leaving the fishing limit zones also were discussed.

The necessity of ban on opening and operating the multiple medical institutions in medical law in Dental case (의료법에서의 의료기관 이중개설 금지조항의 필요성에 대한 치과 사례연구)

  • Ju, Jin-han;Lee, Ga-yeong;Jung, Ku-chan;Lee, Jae-yong;Min, Gyeong-ho
    • The Journal of the Korean dental association
    • /
    • v.57 no.9
    • /
    • pp.514-522
    • /
    • 2019
  • In accordance with Article 33(8) of the Korean Medical Law, it is stated that a medical person cannot open or operate a medical institution by borrowing the name of another medical person. However, the publicity of medical care is threatened by the recent illegal network dental clinics. The purpose of this study is to investigate the actual condition of illegal network dentistry and to analyze the cases and to find out the reason why the prohibition of double opening & operating of medical institution. As a result, the illegal network dental clinics treated less health care insurance treatment such as dental caries and periodontal treatment than general dental hospitals. In contrast, the rate of implementation of illegal network dentistry was high in endodontics treatment and extraction, which could lead to uninsured treatments such as crowns and implants. As a result of Supreme Court precedent analysis, it is concluded that illegal act is not only the opening of a medical institution by borrowing the name of other medical personnel, but also the duplicated operation which has the authority to make decision about management matters of medical institutions. The results of the patient's case survey also showed that excessive dental treatment due to such as dental staff incentive system. In conclusion, the illegal network dental clinics not only threatens the oral health of the public, but also causes leakage of health insurance premiums. In other words, the ban on opening and operating the multiple medical institution should be strictly applied as a strong protection device for protecting the patient in dental case.

  • PDF

A Study on the Illegal Fishery at the Korean Central and Southern Coast of the Yellow Sea (우리나라 서해 중남부의 불법어업에 대한 연구)

  • SEO, Man-Seok;KIM, Il-Pyeong
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2005
  • Realities of illegal fisheries in the central and southern coastal areas of the Yellow Sea were investigated. The study was based on the data released by the Ministry of Maritime Affairs and Fisheries (MOMAF) and Korea Coast Guard (KCG) during 1992-2002 and on questionnaire responses. Analyses of KCG data showed that the number of enforcements by the agency gradually decreased during 1998-2001 but rose in 2002. Analyses of the MOMAF data, however, revealed that illegal fisheries gradually increased during 1992-1996, but sharply increased after 1997, and that such illegal activities became more common in the East Sea beginning in 2001. MOMAF data also showed that although illegal fisheries began to increase in the Yellow Sea after 1997 they tended to decrease in the southern sea after 1998, with a high rate of small-bull trawlers (40.9%) that were non-sanction fisheries (38.1%). Questionnaire responses showed that illegal fisheries were mainly motivated by poverty (27.4%) and largely occurred in coastal fisheries (78.0%). Analyses of questionnaire responses also suggested that illegal fishing activities can be reduced through tougher laws regulating fisheries.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

Analysis of Urban Environmental Factors Affecting Illegal Parking: Focused on the Smart Civil Complaints Data in Seoul, Korea (불법 주정차에 영향을 미치는 도시 환경 요인 분석: 서울시 스마트 불편신고 민원자료를 중심으로)

  • Park, Junsang;Lee, Sugie
    • Journal of the Korean Regional Science Association
    • /
    • v.38 no.3
    • /
    • pp.3-17
    • /
    • 2022
  • The automobile-centered lifestyle has provided many advantages to urban residents, but it is also causing various problems. Among them, illegal parking is one of the representative urban problems that negatively affect them. The purpose of this study is to derive the urban environmental factors affecting illegal parking and provide policy implications by using data related to illegal parking among civil complaints about smart inconvenience reports in Seoul in 2019. It was judged that the influencing factors would differ depending on the time of the complaint, and the analysis was conducted by dividing the time of the complaint into a whole day, daytime, and nighttime. As a result of the analysis of this study, it was found that land-use variables and the number of POI facilities were closely related to illegal parking complaints. Also, the subway station area and road width were found to be closely related to illegal parking complaints. On the other hand, parking facilities did not show significant results with illegal parking complaints. This study showed that the use of civic complaint data could be used as important data to identify urban problems that city residents actually experience and to come up with policy implications.

Detection of Illegal U-turn Vehicles by Optical Flow Analysis (옵티컬 플로우 분석을 통한 불법 유턴 차량 검지)

  • Song, Chang-Ho;Lee, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.948-956
    • /
    • 2014
  • Today, Intelligent Vehicle Detection System seeks to reduce the negative factors, such as accidents over to get the traffic information of existing system. This paper proposes detection algorithm for the illegal U-turn vehicles which can cause critical accident among violations of road traffic laws. We predicted that if calculated optical flow vectors were shown on the illegal U-turn path, they would be cause of the illegal U-turn vehicles. To reduce the high computational complexity, we use the algorithm of pyramid Lucas-Kanade. This algorithm only track the key-points likely corners. Because of the high computational complexity, we detect center lane first through the color information and progressive probabilistic hough transform and apply to the around of center lane. And then we select vectors on illegal U-turn path and calculate reliability to check whether vectors is cause of the illegal U-turn vehicles or not. Finally, In order to evaluate the algorithm, we calculate process time of the type of algorithm and prove that proposed algorithm is efficiently.