• Title/Summary/Keyword: Illegal Contents

Search Result 244, Processing Time 0.023 seconds

A Study of the Impacting Factors on Sharing Illegal Digital Contents and Copyright Cognition (불법 디지털콘텐츠 공유의도에 영향을 미치는 요인과 저작권인식에 관한 연구)

  • Shen, Hong Yan;Lim, Gyoo Gun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.23-40
    • /
    • 2018
  • In order to reduce the spread of illegal digital contents, many studies have been focusing on how to stop it through laws and regulations. Only few of the studies tried to explain the illegal behaviors from individual's viewpoints. This paper aims to examine the intention of sharing illegal digital contents over the Internet and proposes a theoretical model based on the Theory of Planned Behavior (TPB) along with the introduction of two outcome expectations. We also argue that the individuals' cognition of online copyright will influence individuals' illegal contents sharing on the Internet. We have collected data from online survey and offline interview. By empirical study, the results support the theoretical model except the subjective norm which has no effect on individuals' behavior. This is a different finding from the previous researches revealing that the subjective norm has no effect on individuals' unethical actions. Overall, the findings provide strong confirmation that attitude, self-efficacy and outcome expectations impact on individual's intention of sharing illegal contents. In addition, this study proposed an improved cognition of online copyright through education and standard of new media management will reduce illegal contents sharing on Internet.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Design and Implement of a Certification System for Digital Contents Circulation and Secure (디지털 콘텐츠 유통 및 보호를 위한 인증 시스템 설계 및 구현)

  • 고병수;장재혁;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2003
  • The growth of Internet is the main factor that activates the Digital Contents Market. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using. We developed the system prohibits a imprudent using in order to activate the Digital Contents Market. We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through Network.

  • PDF

A Study on Effects of Relative Benefits and Costs of Piracy of Digital Contents on Attitudes and Behaviors of Illegal Duplication (디지털콘텐츠 불법복제의 상대적 편익과 비용이 불법복제태도 및 행동에 미치는 영향)

  • Park, Kyung-Ja
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.489-499
    • /
    • 2015
  • The purpose of this study is to identify factors affecting piracy of online digital contents, focusing on relative awareness of illegal duplications, compared to legal duplication. To do this, the current study integrates factors proposed in existing literature and the previous studies based on the theory of planned behavior and accesses them from cost-benefit point of view. Main findings are summarized as followed;- First, with regard to relative benefits gained by illegal duplication, it is shown that monetary and psychological utility have positive effects on attitudes and behaviors of illegal duplication. Particularly, it is found that monetary incentive is the main cause of illegal duplication as monetary gains are major factors affecting illegal duplication behaviors. Second, it is suggested that ethical cost is a definitive factor that has negative effects on illegal duplication behaviors while technological cost has also significant effects on illegal duplication behaviors. Third, it is confirmed that there is a significant relationship between attitudes and behaviors of illegal duplication. This result shows that an attitude to illegal duplication is antecedent of behaviors as the belief and the value regarding illegal duplication can lead actual behaviors.

A Social Cultural Approach to Illegal Digital Contents Sharing (디지털콘텐츠 불법 파일공유에 관한 사회문화적 접근)

  • Park, Kyung Ja
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.113-133
    • /
    • 2016
  • Why illegal digital contents sharing happens? This study pays attention to the fact that file sharing is an exchanging behavior between people and it is expanding despite of an illegal behavior and proposes that it is necessary for the phenomenon to be understood from social cultural point of view beyond a personal dimension. Based on the social exchange theory, this study demonstrates effects of file sharing attitudes and continuity, regarding 'group norm', 'popular demand', 'reciprocity' and 'social solidarity' as main factors. The main findings of this study are as followed;- First, it is shown that a tacit agreement of a group on file sharing is a determinant of positive attitude to file sharing and the intent of continual file sharing. Second, it is not found that the social relationship factors that are regarded as potential influential factors on file sharing attitude have effects on file sharing behavior, except for 'group norm'. Unlike previous studies, the results may come from the fact that this study deals with an illegal behavior. The third finding indicates a structural relationship between social relationship factors. When members of a group have more amicable attitude to file sharing including silence or a tacit agreement on file sharing, more people ask illegal sharing of files that they need. Such public demand creates expectation of reciprocity. As reciprocity maintains, social connectedness is strengthened. Then, strong social connectedness escalates the intent to maintain file sharing. It is important to notice that this study promotes understanding of how digital contents sharing happens by structuring and demonstrating influential relationship between characteristic factors of the social relationship.

  • PDF

The Study on Countermeasures Against the Infringement of Rights of the Transmission and Reproduce on the Han Wave Contents in the China Market (중국 시장 내 한류 방송 콘텐츠의 전송권 및 복제권 침해 대응 연구)

  • Lee, Jae-Ho;Kim, Hee-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.33-46
    • /
    • 2019
  • The purpose of this study is to analyze how China, which is the largest consumption area of Hallyu broadcasting contents but the most illegal copy market infringe the rights of domestic broadcasters and what of the policy of regulatory authority in this illegal market. To this end, this study investigate the most common types of paths and methods of copyright infringement in the Internet and mobile multi-platform environments, and investigated how broadcasters responded to them with in-depth interviews. As a result of research, the most frequent type of infringement of rights of reproduction were to use links with web and apps and TV pads. In this regard, it was not easy to solve the problem of illegal copy in China in the way that domestic companies responded to individually, and it was very rare that the lawsuit was filed. In the future, the government will need to provide side support for Korean Wave broadcasting contents through steady monitoring as well as market research for eradication of illegal copy.

The Protection System of Digital Contents using a Frame Filter Information based on Public Key (공개키 기반의 프레임 필터 정보를 이용한 디지털 콘텐츠 보호 시스템)

  • Koh Byoung-Soo;Jang Jae-Hyuk;Kang Seok-Jue;Choi Yong-Rak
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.1-9
    • /
    • 2004
  • The growth of Internet is the main factor that activates the Digital Contents Market and gives the convenience, efficiency and usefulness to the users. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. As a result, recently we can see that using the contents illegally through Internet makes the troubles between providers and customers and finally they are at law. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using, We developed the system prohibits a imprudent using in order to activate the Digital Contents Market, We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through network.

  • PDF

Testing a Model for the Effect of Low Self-Control on Cybercrime Mediating by Smartphone Addiction and Its Mediating Process (낮은 자기통제력의 스마트폰중독을 통한 사이버범죄 영향의 매개과정 모형구성과 검증)

  • Lee, Seong-Sik;Ryu, Su-Min;Lim, Su-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.401-411
    • /
    • 2022
  • This study tests a model for the effect of low self-control on cyber crime and its mediating process. Intervening variables include smartphone addiction, social learning and opportunity variables. Analyzing a data from college students in Seoul, it is shown that the effect of low self-control has a significant effect on smartphone addiction. Results also show that smartphone addiction has a positive significant effect on differential association with illegal peers, illegal definition, and illegal opportunity, and in turn cybercrime. In addition, it is found that low self-control has also a direct effect on differential association with illegal peers, illegal definitions, and illegal opportunity without mediating by smartphone addiction. As a result, it is reveal that the effect of low self-control on cybercrime is indirect and its effect is mediated by smartphone addiction, differential association with illegal peers, illegal definitions, and illegal opportunity.