• Title/Summary/Keyword: infringement

Search Result 547, Processing Time 0.021 seconds

A Study on the Public Interest Role of the Detective Industry for Music Copyright Protection (음악저작권 보호를 위한 탐정산업의 공익적 역할 연구)

  • Kim Mi Ok;Yun Sou Bin;Yeom Keon Ryeong
    • Industry Promotion Research
    • /
    • v.8 no.1
    • /
    • pp.23-33
    • /
    • 2023
  • In modern times, damage caused by the spread of the Internet has become very diverse. In particular, due to the craze of K-pop since 2008, the damage caused by copyright infringement in the domestic and international music markets has become the biggest problem in the Internet market. However, the manpower of the police and copyright protection agencies to solve these increasingly intelligent crimes is insufficient. Therefore, we are trying to find out the role of the public interest detective as a supplementary force for the public authority and as a substitute for the copyright protection agency that can provide legitimate help for victims in the prevention of music copyright infringement and disputes. For this study, first, the concept and types of music copyright, the concept of public interest detectives, the current status and system of music copyright were identified, and the role of detectives for music copyright protection was explored through system operation and status analysis of protection agencies and literature review. Through the results of this study, it is hoped that the role of a professional detective in the public interest dimension of music copyright protection can be a good soil for the development of the detective industry in the future.

A study of Chinese fashion design copyright protection cases - Highlighting infringement cases involving the intellectual property rights of Bai Yi Bei in 2023 - (중국 패션디자인 저작권 보호 판례 고찰 - 2023년 백일배(百一杯) 지식재산권 판례를 중심으로 -)

  • Yueding Zhou;Hyunzin Ko
    • The Research Journal of the Costume Culture
    • /
    • v.32 no.2
    • /
    • pp.287-298
    • /
    • 2024
  • Clothing is intimately intertwined with daily lives as every individual relies on it. The pervasive issue of plagiarism in the fashion industry has led to an increased demand to protect intellectual property rights. Currently, studies on the protection of fashion design intellectual property rights in China remain in the exploratory stage and warrant further investigation. This paper addresses the issue in two parts. The first part contains an analysis of the theoretical foundation for the protection of fashion design copyrights. It is further divided into three subsections. The first subsection primarily examines the concept of copyrights and laws. The second subsection focuses on the concept of fashion design copyrights and laws. The third subsection analyzes copyright laws concerning fashion designs in China. The second section offers an analysis of infringement cases involving fashion designs published during the Baiyi Cup Intellectual Property Case Summary Writing Competition held in China in 2023. It outlines the shortcomings of the current Chinese copyright laws regarding the protection of fashion designs, and proposes measures for improvement. This study argues that the institutional framework for intellectual property rights in the Chinese fashion industry should align with practical considerations and explores suitable legal regulations and how they relate to specific circumstances in China. Besides refining the legal framework, fashion designers and enterprises must take measures to entablish the intellectual property rights of their clothing brands.

Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment (HTML5 웹 서비스 환경에서의 개인정보 침해 탐지 모듈 구현)

  • Han, Mee Lan;Kwak, Byung Il;Kim, Hwan Kuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1025-1036
    • /
    • 2016
  • The conversion of the international standard web utilization HTML5 technology is being developed for improvement of the internet environment based on nonstandard technology like ActiveX. Hyper Text Markup Language 5 (HTML5) of basic programming language for creating a web page is designed to consider the security more than HTML4. However, the range of attacks increased and a variety of security threats generated from HTML4 environment inherited by new HTML5 API. In this paper, we focus on the script-based attack such as CSRF (Cross-Site Request Forgery), Cookie Sniffing, and HTML5 API such as CORS (Cross-Origin Resource Sharing), Geolocation API related with the infringement of the personal information. We reproduced the infringement cases actually and embodied a detection module of a Plug-in type diagnosed based on client. The scanner allows it to detect and respond to the vulnerability of HTML5 previously, thereby self-diagnosing the reliability of HTML5-based web applications or web pages. In a case of a new vulnerability, it also easy to enlarge by adding another detection module.

시선집중 - 인터뷰 - PADIAS 과정을 통해 한국의 많은 특허인들이 진정한 미국의 특허실무를 이해하고 활용하는데 도움이 되기를 바랍니다

  • 한국발명진흥회
    • 발명특허
    • /
    • v.35 no.9
    • /
    • pp.28-34
    • /
    • 2010
  • 지난 7월 20일, 미국 로스쿨(Franklin Piercie Law Center)의 과정인 PADIAS(Patent Application Drafting and Infringement Strategies)의 1회 수료식이 한국발명진흥회에서 거행되었다. 총 52시간에 걸친 미국 특허 출원 및 소송 전략에 관한 명품강의였다는 것이 참석자들의 중론이다. 이 프로그램 기획자이자 주 강사인 함윤석 변호사와 전화 인터뷰를 했다.

  • PDF

Analysis of the right to sunshine for elevated structure construction (고가 구조물 건설에 따른 일조권 분석)

  • 강기수;김상석;양승태;강인준
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.04a
    • /
    • pp.485-490
    • /
    • 2004
  • Recently, distribution transfer velocity was extremely lowered by high supply rate of vehicle and low road rate. Therefore expansions of transfer network these were subway, road and railway to recover competitive power as a reform measure of physical distribution traffic were become preference previous subject. For reason of that, an expansion of transfer network is meeting competitive power as selected an elevated road in the ground road network that condition of location calm and get out of the existing urban than the underground road to connect oversensitive a large city and expanded small and medium satellite town. In the meantime, while elevated structures construct, they go through the civilian residential section, agriculture land, etc. The consequence is that it raises a vibration, noise, dust, an infringement of the right to a view and an infringement of the right to a sunshine. In this study, we analyzed Quantitatively sunshine quantity with building 3D simulation model of civil structure. Therefore, we present as planning data to reduce a civilian appeal for dispute of the right to sunshine and an economic and time loss between the government and construction company In addition to that, for the standard of the standard plan of usable sunshine quantity program in the practical business, the building of convenient user interface will be the project to be done.

  • PDF

IMPLIED WARRANTY Concerning the Intellectual Property Infringement in the Field of the Information Technology(IT) (정보통신(IT) 분야에서의 제 3자 지적재산 침해에 따른 IMPLIED WARRANTY에 관한 고찰)

  • Jo, Ji-Hong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.484-489
    • /
    • 2011
  • Most of IT small businesses in Korea are companies which usually take parts from the technically advanced companies and assemble the parts into a complete whole for big companies. Intellectual property-related issue of IT small businesses in Korea is not the direct action or claim but the matter of contract concerning the 3rd party intellectual property infringement or the matter of each of the applicable law on the implied liability issues. Because bargaining power of the IT small businesses is not as big as the technically advanced companies, they can not receive explicit guarantees. Therefore, government-affiliated organization should concern about this matter of contract.

Anonymity Personal Information Secure Method in Big Data environment (빅데이터 환경에서 개인정보 익명화를 통한 보호 방안)

  • Hong, Sunghyuck;Park, Sang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.179-185
    • /
    • 2018
  • Big Data is strictly positioning one of method to deal with problems faced with mankind, not an icon of revolution in future anymore. Application of Big Data and protection of personal information have contradictoriness. When we weight more to usage of Big Data, someone's privacy is necessarily invaded. otherwise, we care more about keeping safe of individual information, only low-level of research using Big Data can be used to accomplish public purpose. In this study, we propose a method to anonymize Big Data collected in order to investigate the problems of personal information infringement and utilize Big Data and protect personal. This will solve the problem of personal information infringement as well as utilizing Big Data.

Tracking Methods of User Position for Privacy Problems in Location Based Service (위치 기반 서비스에서 사생활 침해 문제 해결을 위한 사용자 위치 추적 방법)

  • Ra, Hyuk-Ju;Choi, Woo-Kyung;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.7
    • /
    • pp.865-870
    • /
    • 2004
  • Development of new information and traffic technology causes fast-growing in the field of information-based system. At recent, development of LBS(Location Based Service) makes a remarkable growth of industry as GPS(Global Positioning System) becomes wide-spread and location information becomes more important. However, there is a problem like infringement of privacy when location information is used improperly[1]. In this paper, LBS platform is proposed in order to prevent infringement of privacy. To implement, we classify user path as pattern in a zone of user life. Thereupon, location information is provided according to user' specific situation.

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

The Study of Information Security Technologies for Security Incidents in Online Game Service (게임 서비스 침해유형에 따른 기술적 대응방안 연구)

  • Chang, Hang-Bae;Kim, Kyung-Kyu;Lee, Si-Jin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.83-98
    • /
    • 2007
  • This study focused on online game security, which has been considered relatively insignificant when compared to the online game industry's rapid growth. In this study, the state of security incidents in the Korean game industry and security solutions for such cases were examined. At first the security incidents were classified according to the type of game security infringement. Based upon this classification, this study analyzed the causes that give rise to infringement of online game security, and developed technical solutions for such cases. Finally, this study verified whether or not these technical solutions could be applied to online game sites.