• Title/Summary/Keyword: Illegal Downloading

Search Result 10, Processing Time 0.022 seconds

Level of User Awareness for Illegal Downloading of Movie Content (영상 컨텐츠 불법 복제에 관한 사용자 의식 수준)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.212-224
    • /
    • 2009
  • Proliferation of high performance internet infrastructures finally allows their users download a single copy of regular movie just within in a couple of seconds. Ease of accesses to the software for downloading consequently leads them insensitive to the ethics or legitimacy of their conduct. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Whilst the level of awareness is addressed even in a far-fetched manner in the area of music piracy and computer software piracy, the case of movie is much different in that we even fail to find any survey that has been made for movie piracy. The survey has been made by devising questionnaires for netizens and it was posted web WorldSurvey, which is the most prominent online survey site in Korea. To our surprise, 9 out of 10 respondents expressed they actually resort to illegal downloading for the reason of convenience. We realized one more surprise. More than 95% of netizens conspicuously aware of their downloading behaviors are mischievous and illegal without reservation.

Comparisons of the Awareness of Domestic and Foreign Users for Illegal Downloading of Movie Content (영상 컨텐츠 불법복제에 관한 국내외 의식 수준 비교 연구)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.297-309
    • /
    • 2012
  • The MPAA(Motion Picture Association of America) warned about serious problems of piracy due to nearly a quarter of all Internet traffic around the globe was related to Internet piracy. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Our study becomes a motivation to consider about seriousness of piracy by comparing between Korea and foreign cases. To our surprise, the survey reveals that Korean netizens conspicuously aware of their downloading behaviors outpaces Canadian netizens. Canada lacks the basic protections for the digital environment and is a safe haven for Internet pirates.

A Study on Factors that Influence the Attitude to Pirate Smartphone Application (스마트폰 애플리케이션 불법적 사용 태도에 미치는 요인 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.19-34
    • /
    • 2014
  • As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.

Unethical behaviors in retail settings: Differences by consumer characteristics and anomie (소매유통환경에서의 비윤리적 행동의식: 소비자특성 및 아노미와의 관계)

  • Park, Kyung-Ae
    • Fashion & Textile Research Journal
    • /
    • v.10 no.6
    • /
    • pp.907-916
    • /
    • 2008
  • The purposes of this study were to examine the consumer beliefs on the wrongness and occurrence of unethical behaviors in retail settings, to examine the differences in unethical beliefs by consumer characteristics, and to examine the effects of anomie on unethical beliefs. A total of 609 questionnaires collected from a consumer survey were analyzed. Results revealed that respondents tended to perceive illegal activities as the most unethical and the least prevalent behaviors and downloading intellectual properties as the least unethical and the most prevalent behaviors. There were differences by age, marital status, occupation, and education in the four dimensions of unethical beliefs including actively benefiting from illegal/deceiving activities, passively benefiting at the expense of the seller, no harm/no foul, and common but questionable actions. Partial differences were observed by shopping frequency and return experience. Valuelessness of anomie affected actively benefiting from illegal/deceiving activities and no harm/no foul.

System for Anti-Piracy of Software under Windows Operating System (윈도우 운영 체제에서 불법 소프트웨어 방지 시스템)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.423-434
    • /
    • 2004
  • This paper presents the software system that protects illegal installation and use of the commercial software. The server computer in this system stores the compressed versions for all software, while client computers install all software by downloading them from the server. Also the client computers periodically report to the server whether they have illegally installed software. This system introduces authentication and encryption/decryption using the session key under Windows Operating System to prevent interception of the software package from outside world and malicious modification of the transfer message between the server and the client. The proposed system in this Paper has several advantages such as providing real-time control of license and easy maintenance of the software as well as protecting illegal use of the software.

Relationship between Digital Contents Characteristics and Consumer's Usage Behavior in the Online Environment (온라인 환경에서 디지털콘텐츠의 특성과 소비행동의 관계)

  • Lee, Han-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.234-241
    • /
    • 2011
  • The recent technology boom has created a new digital age. With the help of information technology consumers can have more power than ever and they use digital contents more than ever. This study relates consumer attitude to the recent digital contents using behavior about digital file-sharing. Through the use of the multimethod approach, we identify four characteristics can affect illegal digital contents using behavior. The methodology used was to take in depth look at the consumer with phenomenology as a qualitative research. We select 6 participants who have experience of digital content using. We also examine the structural configurations of the relationship between digital contents characteristics and illegal downloading intention. We surveyed 200 people who also had experience of digital content. This research gives theoretical and practical implication to the marketers related to online communication.

Video Contents Security Streaming (동영상 콘텐츠 보안 스트리밍)

  • Kim, Minseh;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.67-74
    • /
    • 2012
  • Since current paid video contents have a security vulnerability, anyone can obtain the information of video contents. In this paper, we analyze current video encryption methods which are used commercially to prevent illegal downloading movies. And we propose an address encryption method which can encrypt and decrypt video contents in program itself. In the performance evaluation, we compare the proposed method with the conventional method to show the improvement of security with the reduced delay for encoding and decoding through encryption.

A study on Convergence of the Digital Contents Industry and Possibility of Exportation (디지털콘텐츠 산업의 융합화와 수출 가능성)

  • Chun, Byung-June;Choi, Dong-Gil
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.55-78
    • /
    • 2010
  • This study analyses recent development of digital contents industry. The purpose of this study is to show how the convergence phenomenon is occurring in the digital contents industry. Furthermore, this study examines the influence of digital convergence on the digital contents industry. The characteristics of the digital contents industry falls roughly into three features. To begin with, technical aspect of the industrial feature is that digitalized contents can be used in various digital devices, namely OSMU(One Source Multi Use). The second feature is related to protection of copyright against illegal file sharing and downloading. One final point is that platform for distribution channels has been universal by digital convergence. To sum up, the notable feature of digital contents industry is high value-added. Also, digital contents industry is composed of users, digital device, network, and universal contents. Users are the key component of digital contents industry, who is distinguished from consumers. Digital devices such as mobile phone, PDA can play all kinds of digital contents and make users communicate in two-ways. Portable devices also allow the users to consume digital contents at any place. Digital contents can be distributed by both wire and wireless networks. And most of transactions can be made through networks. There are three key issues about digital convergence. Entry barriers for market become lowered; the age of contents users is changed from old generation to young generation. And the form of contents devices is changing rapidly. Traditional contents field such as movie, music, broadcasting, publishing, animations are combined into one digital contents territory. As a result, this paper suggests that digital convergence phenomenon will be accelerating for the future. According to the result of this study, the advent of digital convergence and e-Commerce will have significant influence on trade of digital contents.

  • PDF

Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC (PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저)

  • Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.365-375
    • /
    • 2019
  • A PLC (Programmable Logic Controller) is a highly-reliable industrial digital computer which supports real-time embedded control applications for safety-critical control systems. Real-time operating systems such as uC/OS have been used for PLCs and must meet real-time constraints. As PLCs have been widely used for industrial control systems and connected to the Internet, they have been becoming a main target of cyberattacks. In this paper, we propose an execution code sanitizer to enhance the security of PLC systems. The proposed sanitizer analyzes PLC programs developed by an IDE before downloading the program to a target PLC, and mitigates security vulnerabilities of the program. Our sanitizer can detect vulnerable function calls and illegal memory accesses in development of PLC programs using a database of vulnerable functions as well as the other database of code patterns related to pointer misuses. Based on these DBs, it detects and removes abnormal use patterns of pointer variables and existence of vulnerable functions shown in the call graph of the target executable code. We have implemented the proposed technique and verified its effectiveness through experiments.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.