• Title/Summary/Keyword: infringement

Search Result 547, Processing Time 0.024 seconds

Effects of Consumer Innovativeness on the Evaluation of the Online Fashion Advertisement Sustainability (온라인 패션광고의 지속가능성 평가에 대한 소비자 혁신성 효과)

  • Son, Mi Young;Yoon, Namhee
    • Science of Emotion and Sensibility
    • /
    • v.19 no.2
    • /
    • pp.43-54
    • /
    • 2016
  • The purpose of this research was to analyze the effect of consumer innovativeness on the evaluation of online fashion advertisement sustainability and on purchase intentions of advertising products. Online survey have been conducted of 573 people who had experience of online advertisements. The data collected from the surveys were analyzed by the factor analysis, the t-test and the multiple regression analysis. the results are as follows: Firstly, it has been identified that the concept of sustainability of online fashion advertisement consists of four sub-elements of the objectivity of advertisement expressions, the non-harmfulness of advertisement expressions, the protection of personal information, and the non-infringement of web use. Secondly, the group that has a higher consumer innovativeness shows a significantly higher experience of online advertisements as well as more many internet use hours than those who have a lower consumer innovativeness. In addition, comparing with the group that shows lower consumer innovativeness, the group who has higher consumer innovativeness shows a significantly higher recognition of the protection of personal information, the non-infringement of web use and the objectiveness of advertisement expressions among the sub-elements of online fashion advertisement. Lastly, the objectiveness of advertisement expressions and the non-infringement of web use significantly affect the intentions of the group that has high consumer innovativeness to purchase advertised products, and the purchase intentions of those who have low consumer innovativeness are significantly affected by the objectiveness of advertisement expressions and the protection of personal information.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.

A case study of Infringement on the second digital copyrights of comics contents (만화콘텐츠의 2차적 디지털 저작권 침해사례 연구)

  • Kim, ha-yeong;Yoon, ki-heon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.109-110
    • /
    • 2011
  • 만화가 각종 문화콘텐츠의 중요한 미디어믹스 원천 소스로 떠오르면서 이에 따른 2차적 저작권분쟁 또한 증가하고 있다. 이에 따르는 사회적 기회비용이 크고 향후 문화콘텐츠 산업에 악영향을 줄 수 있다. 따라서 기존의 공정이용 대책과 함께 만화 원작자와 관련단체, 그리고 정부기관의 콘텐츠 이용 형태와 권리 관계에 따른 구체적이고 세분화된 풀랫폼이 개발되어야 하고 더불어 기술적 보호 장치와 보상체제를 갖추는 노력이 선행되어야 한다.

  • PDF

Analysis of Copyright and Licensing Issues in Artificial Intelligence (인공지능에서 저작권과 라이선스 이슈 분석)

  • W.O. Ryoo;S.Y. Lee;S.I. Jung
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.6
    • /
    • pp.84-94
    • /
    • 2023
  • Open source has many advantages and is widely used in various fields. However, legal disputes regarding copyright and licensing of datasets and learning models have recently arisen in artificial intelligence developments. We examine how datasets affect artificial intelligence learning and services from the perspective of copyrighting and licensing when datasets are used for training models. The licensing conditions of datasets can lead to copyright infringement and license violation, thus determining the scope of disclosure and commercialization of the trained model. In addition, we examine related legal issues.

A Brief Sketch of Architectural Works Copyright with the United States Cases: Analysis based on Thomas Shine v. David M. Childs and Skidmore Owings & Merrill, LLP Case

  • Moon, Hwakyung
    • Architectural research
    • /
    • v.9 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • These days the copyright plays a significant role in various fields of creative works and it has expanded dramatically into unprecedented ways. In Korea, architectural works copyright cases are rare due to the lack of information and understanding of the architectural works copyright. Architectural works copyright can promote architects' creative activities and enhance the quality of architectural works as art. Nevertheless, there is little effort to advance the studies of architectural works copyright in the architectural design area. Under these circumstances, this research attempts to share the basic case laws and remedies for various architectural works copyright issues in the U.S. cases. This Article examines the Thomas Shine v. David M. Childs and Skidmore Owings & Merrill, LLP Case which is the most recent case as I could reach. This case is about a story between two architects, one is from a very prestigious architectural design firm and the other, once Yale Architectural student, now practices his design work as an up-and-coming architect. A close examination of this case will provide a legal and architectural spectrum of copyright. That is, it will make it more specific how to solve the copyright infringement. Artistic and technological contexts are overlapped in Architectural works copyright as its inherent characteristics. Therefore, different ways from other copyrighted works are needed to access the untangled equations of the architectural works copyright protection. In addition, more comprehensible and specific regulations that can impose a remedy more suited to the architectural works copyright violations are needed and they should enable architects to fulfill their architectural activities under wide range of copyright protection. Moreover, in prior to all efforts to handle those equations, fundamental knowledge of architectural works copyright is required to improve the copyright protection in the architectural design area as well as to provide for the globalizing design practice. Ultimately, all of these efforts will be rewarded when constant researches based on Korean and other countries' architectural copyright cases can support them and it would be great if this research can set the stage for resolving expected copyright conflicts within the architectural design area.

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

Empirical Analysis on Economic Factors of Infringement on Ocean Sovereignty from Chinese fishing boats (중국어선 해양주권 침해의 경제적 요인에 관한 실증적 연구)

  • Oh, Sang-Jin;Choi, Kyoung-Hoon;Park, Gyei-Kark
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.3
    • /
    • pp.69-90
    • /
    • 2017
  • Areas of marine activity have expanded into exclusive economic zones and the continental shelf since the United Nations Convention on the Law of the Sea(UNCLOS) in 1994, The signatory countries have been enforcing their maritime rights and competition in the international community has become intensified. Marine-related issues, including maritime sovereignty, has become an increasingly important issue with many national security and related studies following this trend. However, while there are many policy-related studies there remain few empirical studies. This paper conducted a study of illegal cases of Chinese fishing boats which are quite frequently for an empirical study on maritime sovereignty. This study conducted empirical analysis regarding factors relating to ocean sovereignty infringement by using correlation and multiple regression analysis. The result of observed increases in illegal Chinese fishing boats decreased the production of aquatic products, whish resulted in economic fishery losses to Korea households and inflation in the Korean economy.

A Study of the Legal Principles in the Judicial Precedents of the Copyright Relating to Advertising Focusing on the Photographic Works (광고 관련 저작권 판례에 나타난 법리의 특성: 사진 저작물을 중심으로)

  • Cho, Jae-Yung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4424-4431
    • /
    • 2015
  • The purpose of the study is to analyze the judicial precedents of the copyright relating to advertising focusing on the photographic works and find the characteristics of the legal principles of the copyright infringement or no. As the results of the analyses of the exact 6 precedents, the creativity of the works was the main issue of the judgment of the copyright infringement or no, comparing that 'on the basis' and 'practical similarity' were mainly applied the judgment. It is implied that the photographic works depending on the technologies are more difficult to prove their creativity, and the simple photo of the product itself without or lack of the photographer's creative effort and labor is not acknowledged as a copyrighted work in advertising area.

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.