• Title/Summary/Keyword: 무단 공유

Search Result 22, Processing Time 0.022 seconds

Comparisons of the Awareness of Domestic and Foreign Users for Illegal Downloading of Movie Content (영상 컨텐츠 불법복제에 관한 국내외 의식 수준 비교 연구)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.297-309
    • /
    • 2012
  • The MPAA(Motion Picture Association of America) warned about serious problems of piracy due to nearly a quarter of all Internet traffic around the globe was related to Internet piracy. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Our study becomes a motivation to consider about seriousness of piracy by comparing between Korea and foreign cases. To our surprise, the survey reveals that Korean netizens conspicuously aware of their downloading behaviors outpaces Canadian netizens. Canada lacks the basic protections for the digital environment and is a safe haven for Internet pirates.

Rethinking the Right to Culture in the Digital Age The Issues of Copying Culture and Content Curation (디지털 시대 문화 권리의 제고 복제문화와 콘텐츠 큐레이션의 쟁점)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.197-224
    • /
    • 2015
  • This paper critically investigates the cultural phenomenon surrounding the news mobile phone app in which 'curation', relying on the news editing and adaption, has become much more significant than making the news directly. This study affirms the fact that a copying culture which is basically a combinative effect of duplication (alias) and imitation(mimesis) enables us enrich the human beings' creative activities. However, we need to warn the regressive aspects of copying culture challenging the journalistic principles. This study exemplifies a case of Pikicast, which has become the most rapid growing news content mobile app in Korea. By doing a case study, this paper suggests that 'social gift' should be given to the online users as a whole. The communal and social gift would be an alternative way to the unpaid crawling of the news resources from the digital commons by the news content curating corporation such as Pikicast.

  • PDF

Study for coping with water shortage analysis: Imjin-River Basin in dry season (임진강 유역 갈수기 물 부족 원인 분석에 따른 대응 방안 연구)

  • JANG, Suk-Hwan;LEE, Jae-Kyung;LEE, Hyo-Sang;OH, Ji-Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.261-261
    • /
    • 2016
  • 임진강 유역은 우리나라와 북한과의 접경지역에 속하는 유역으로서 임진강은 북한에서 발원하여 남한으로 흘러 한강으로 유입되는 공유하천으로 볼 수 있다. 본 연구 유역은 이수, 치수, 수질, 환경 측면에서 타 유역에 비해 불안요소가 많은 지역이므로 남북한의 관계 개선을 통한 효과적인 대책 수립에서 공동의 노력이 필요한 지역이라 할 수 있다. 과거에 집중호우와 태풍의 영향 등으로 인하여 많은 피해로 인하여 이에 따른 대책과 많은 계획 등이 수립되었고, 북한의 무단방류에 따른 사고로 인하여 피해로 인하여 이를 극복하고, 홍수를 조절하는 목적으로 군남홍수조절지, 한탄강홍수조절댐을 건설하여 홍수에 따른 선제적 대응과 주민 피해 등을 방지하고자 하였다. 그러나 최근 경기북부를 포함한 임진강 유역의 가뭄으로 인한 유량의 감소로 인하여, 2014~2015년의 파주 장단반도 일대의 농업용수 부족과 하구의 조위, 즉 염도에 의한 영향으로 하류부 급수 불량 등 이수적 측면에서 주민들의 피해 문제가 속출하고 있는 실정이다. 위와 같은 배경을 바탕으로 본 연구에서는 임진강 유역에 위치한 기상 수문관측자료(2000년~2015년)를 이용하여 다음 내용을 연구하였다. 첫째로 수문기상인자들의 경향성 분석을 통하여 임진강 유역의 유량 감소 원인을 파악하였으며, 수문기상인자들의 감소에 따른 영향과 북한 댐건설에 따른 유역변경 영향에 대하여 분석을 수행하였다. 전체적으로 임진강 유역의 유량은 감소추세에 있으며, 북한 댐건설의 영향이 있는 것으로 파악되었다. 또한 최근 2014년과 2015년의 유량 감소는 강수량의 감소 영향이 큰 것으로 나타났다. 두 번째로 북한 댐건설에 의한 영향을 살펴보기 위해 임진강 상류를 대상으로 하천유출모형인 PDM을 이용하여 장기유출모의를 수행하였으며, 모의결과 북한 댐건설에 의해 유출특성이 변하였음을 확인하였다. 세 번째로 임진강 유역 갈수량을 추정하고 물 부족량 및 필요수량을 분석하였다. 분석결과, 북한 댐건설 이후를 기준으로 물 부족량이 발생하였으며, 이에 필요한 필요 수량을 제안하였다. 또한 최근 2014년과 2015년과 같은 비상시에 대한 필요 수량도 제안하였다. 마지막으로 앞서 제안한 필요 수량을 확보하기 위해 기존댐 담수 및 연계운영, 신규 수자원 확보 방안, 남북 공유하천 공동 관리 방안 등의 대응방안을 제안하였다.

  • PDF

Design of Efficient Intrusion Detection System using Man-Machine (Man-Mchine에 의한 효율적인 침입 탐지 시스템 설계)

  • Shin, Jang-Koon;Ra, Min-Young;Park, Byung-Ho;Choi, Byung-Kab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.39-52
    • /
    • 1996
  • Networking revolution provides users with data and resources sharing, distributed processing, and computer communication in cyberspace. However, users may use computers as a way of unauthorized access, system destruction, and leakage of the stored data. In recent trend, incresing of hacking instances which are from domestic as well as abroad reaches to the level of seriousness. It, therefore, is required to develop a secure system for the National Depense computing resources and deploy in practice in the working field as soon as possible. In this paper, we focuss on finding the security requirements of a network and designing Intrusion Detection System using statical intrusion detection and rule-based intrusion detection analysis through accumulating audit data.

Design and Implementation of UCC Metadata Manager for Social Collaborative Service (소셜 협업 서비스를 위한 UCC 메타데이터 매니저 설계 및 구현)

  • Oh, Jung-Min;Song, Ju-Hong;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.1-10
    • /
    • 2011
  • Social network service is defined as an online service or communication service based on social relations among people applied the concept of social network. Social collaborative service included in social network service is characterized by the new value of modified content or recreated content made through collaborative creation process between members of the group. It has the remarkable merits such as sharing and collaboration. But, at the same time, it has the latent problems such as content reuse or copy that is not allowed for members to use. It has been emerged that UCC which is a typical example of recreated or modified content has the copyright issues in both creation and publishing step. To resolve this matter, we don't have many appropriate methods except CCL so far. So, in this paper, we define the problem and implement the UCC metadata manager to control metadata reflecting the feature of UCC. We draw the reference metadata element to identify original content utilized re-creation process. After that we define the R.Metadata Loader module based on the use case. Finally, the proposed UCC metadata manager provides the information of referenced content and lets us to identify the relationship between reference contents. So as to implement prototype, we use Kaltura which is CMS using open source and obtain functional extensibility of metadata manager by using open API.

Application of Geospatial Information Utilization System using Unmanned Aerial Image (무인항공 영상을 이용한 공간정보 응용 시스템 활용 방안)

  • Lee, Keun-Wang;Park, Joon-Kyu
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.201-206
    • /
    • 2019
  • Korea is constructing geospatial information application system for geospatial information utilization, but it is trying to establish a system for joint use of geospatial information system centering on Ministry of Land Transport and Transport due to the problem of sharing. The purpose of this study is to investigate and analyze the geospatial information application system operated by local governments, and to suggest the application of geospatial information application system using unmanned aerial images. As a result of the research, it was found that the functions of existing spatial information application system are concentrated on the public services and it is difficult to share and utilize data between administrative departments. In addition, the utilization of the system using unmanned aerial image has been suggested, and additional functions such as vector display, area calculation, and report generation have been derived to improve the usability of geospatial information application system. If additional functions of spatial information application system are added through further studies in the future, it will be possible to use it as a basic data of field survey and policy decision in related fields. And non-experts will be able to improve the efficiency of work by utilizing highly accurate geospatial information in various fields.

Qualitative Assessment of web quality and web-activities (웹사이트 품질과 웹활동에 따른 질적성과연구)

  • Lee, Jiwon;Kang, Inwon
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.41-65
    • /
    • 2015
  • Online firms collect consumers' private information, which serves as a valuable database for marketing activities. In order to encourage consumers to provide their private information, online firms offer high quality websites for consumers who provide private information. However, identity theft, phishing, and pharming, become critical social issues, consumers started to avoid providing their private information to online firms. Thus, consumers often provide false or limited information, which lacks value for practical use for the online firms. The main issue raised in this study is to discuss how online marketing activities has influence on consumers attitude and information providing behavior. From the result, this paper found that websites reputation had greatest impact on willingness of providing information. Also this study revealed that unauthorized use is the key factor for increasing distrust and avoidance of providing information.

  • PDF

Legal Problem on the Clipping of the Photographic Works in the Social Media (소셜미디어에서의 사진저작물 스크랩에 관한 법률문제)

  • Jang, Yeon-Yi;Kim, Hee-Kweon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.242-256
    • /
    • 2011
  • The activity to share personal daily life through social media is becoming more common. In this case, photographs as well as text are used a lot; it has been as easy as winking to clip others' photographs just as it's very easy to take and post pictures. If the picture is the photographic work protected by the copyright law, however, the clipping should be paid close attention. If you use others' photographic works without authorization, you infringe their copyright; if you post them on your social media such as blog, you infringe the right of reproduction, interactive transmission and exhibition. Even though the clipping is permitted, if you'd like to use the photographic works for a profit-making purpose, you should get additional authorization. Others' photographic works are occasionally altered and used for the purpose of avoiding the argument in relation to the infringement of copyright; this act means that it's the infringement of the right of reproduction, the right to preserve the integrity and the right of the production of derivative works for degrees of alteration. We can download others' photographic works with a few mouse clicks thanks to the technology of capturing the screen; we have to recognize that all the acts technically possible are not always legal.

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

An Analysis of Usage of Sci-Hub in Korea (국내 Sci-Hub 이용 현황 분석)

  • Jeeyoung, Suh
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.473-490
    • /
    • 2022
  • This study was conducted to examine Sci-Hub, which provides the original text of academic papers to be provided for a fee by bypassing copyright, and to establish a basic basis for understanding the usage behavior of researchers with access restriction in Korea by analyzing the domestic Sci-Hub usage based on the dataset released by Sci-Hub in 2017. Therefore, after grasping the current status of the world related to Sci-Hub, the categories were set and analyzed by region where the dataset was downloaded, subject matter of academic papers, publisher, OA status, and published year. As a result of the study, the most downloaded areas were Seoul and the metropolitan area, and papers and journals in the field of natural science were downloaded the most, and about 20% of papers were in Open Access state. The papers published between 2010 and 2017 were the most downloaded, and IEEE's papers were the most downloaded, showing that recently published academic papers in the natural sciences were the most downloaded by the time they were downloaded.