• Title/Summary/Keyword: Internet Laws

Search Result 152, Processing Time 0.03 seconds

Internet comment manipulation and criminal responsibility

  • Lee, Ju-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.6
    • /
    • pp.75-79
    • /
    • 2018
  • The purpose of this paper is to introspect again the role of the criminal law at a time when it is said that numerous criminal and legal discussions are needed to develop the so called "reply manipulation " case that is shaking the nation's political history. The research method considered the literature and precedents discussed in the past, and discussed the issue of subculture abuse caused by the internet, which is a product of convenience and affluence that came with the Forth industrial revolution through criminal law. Through a computer program, a discussion was held on what penalties would be imposed on the criminal law for attempting to manipulate public opinion by manipulating the so-called number of comments or Reaction. Question of whether the criminal law should further emphasize the need for a discussion on the need for a method to strengthen the preventive functions of the criminal law and expand the scope of punishment in order to address new causes of risk that came with the development of science. Without reflecting on whether such as "government-inspired demonstration "would be possible in today's world that was in the public perception of the authoritarian government of the past, it is a problem to see that the political goals of a particular group can be achieved by manipulating comments or creating public opinion on the Internet. The duty of criminal law is to protect the interests of the law. The role of the criminal law should be maintained the self limiting as far as possible in cases of violation or danger of the law. Still, it is a problem that the role of the criminal justice system today is too aggressive and is seen as a top tool rather than a last resort for solving problems. he role of the internet will be expanded further in the Hyper Connected society. To solve these problems, we should look forward to a change in the priority of other laws and policies other than criminal law.

A Research on the Digital Information of the Deceased (사자(死者)의 디지털 정보에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.247-253
    • /
    • 2010
  • The demand that needs 'Digital Legacy', a notion that an Internet user can transfer his private blogs, e-mail and financial assets to inheritors and party interested when he died suddenly in the accident, has been growing recently. This issue has become a social hot potato since Justine Ellsworth's father in USA sued Yahoo for the right to access his son's Yahoo e-mail account after Justine Ellsworth had died in Iraq, in November, 2004 and the problems happened to deal with suicide-related blogs and homepages when great entertainers in Korea committed suicide and soldiers' parents in the situation of warship Chonan tragedy in Korea demanded access to soldiers' homepages and e-mail accounts. The point at issue focuses on the property matters about the digital information of the deceased and the relationship between the deceased and the Internet Service Provider(ISP). This research looks into the trend of judicial precedents and laws related to the digital information of the deceased and suggests the preliminary data of the next research.

A Social Motivation-aware Mobility Model for Mobile Opportunistic Networks

  • Liu, Sen;Wang, Xiaoming;Zhang, Lichen;Li, Peng;Lin, Yaguang;Yang, Yunhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3568-3584
    • /
    • 2016
  • In mobile opportunistic networks (MONs), human-carried mobile devices such as PDAs and smartphones, with the capability of short range wireless communications, could form various intermittent contacts due to the mobility of humans, and then could use the contact opportunity to communicate with each other. The dynamic changes of the network topology are closely related to the human mobility patterns. In this paper, we propose a social motivation-aware mobility model for MONs, which explains the basic laws of human mobility from the psychological point of view. We analyze and model social motivations of human mobility mainly in terms of expectancy value theory and affiliation motivation. Furthermore, we introduce a new concept of geographic functional cells, which not only incorporates the influence of geographical constraints on human mobility but also simplifies the complicated configuration of simulation areas. Lastly, we validate our model by simulating three real scenarios and comparing it with reality traces and other synthetic traces. The simulation results show that our model has a better match in the performance evaluation when applying social-based forwarding protocols like BUBBULE.

Context-based classification for harmful web documents and comparison of feature selecting algorithms

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.867-875
    • /
    • 2009
  • More and richer information sources and services are available on the web everyday. However, harmful information, such as adult content, is not appropriate for all users, notably children. Since internet is a worldwide open network, it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse ways, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies and examine which algorithms for feature selection, the process that select content terms, as features, can be useful for text categorization in all content term occurs in documents, are suitable for classifying harmful contents through implementation and experiment.

  • PDF

An Evolution Model of Rumor Spreading Based on WeChat Social Circle

  • Wang, Lubang;Guo, Yue
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1422-1437
    • /
    • 2019
  • With the rapid development of the Internet and the Mobile Internet, social communication based on the network has become a life style for many people. WeChat is an online social platform, for about one billion users, therefore, it is meaningful to study the spreading and evolution mechanism of the rumor on the WeChat social circle. The Rumor was injected into the WeChat social circle by certain individuals, and the communication and the evolution occur among the nodes within the circle; after the refuting-rumor-information injected into the circle, subsequently,the density of four types of nodes, including the Susceptible, the Latent, the Infective, and the Recovery changes, which results in evolving the WeChat social circle system. In the study, the evolution characteristics of the four node types are analyzed, through construction of the evolution equation. The evolution process of the rumor injection and the refuting-rumor-information injection is simulated through the structure of the virtual social network, and the evolution laws of the four states are depicted by figures. The significant results from this study suggest that the spreading and evolving of the rumors are closely related to the nodes degree on the WeChat social circle.

A Study on Improving Cyber Liability Insurance for Electronic Financial Incident in Easy Payment System (간편결제 서비스에서 전자금융사고 시 국내 사이버 배상책임보험의 한계 및 개선방안에 대한 연구)

  • Lee, Han-Jun;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • A convergence of finance and information technology brought a remarkable development in Fin-Tech industry. On the other hand, currently existing laws seemed inappropriate to address the liability of financial institutions, Fin-tech enterprises and consumers in case of financial accidents due to its ambiguity. The minimum insurance obligation by financial institutions specified under the Electronic Financial Transaction Act 2006 is not keeping with current reality, considering transaction volume, frequency of incidents, and security investments. This paper aims to lay stress on the need of cyber liability insurance by understanding the domestic financial incidents and management, and the limit of existing insurance policy.

Actual Conditions of Cyberbullying and the Countermeasure (사이버 괴롭힘의 실태와 대응방안)

  • Lim, Woon-sik;Choi, Hyun-sick
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • The purpose of this study is to find the exact state of cyberbullying and the countermeasure for it. cyberbullying is characterized by having the wideness, the anonymity and the intellectualization unlike the harassment of off-line. The result of this study, the cyberbullying is increased through the e-mail, cellular phone, and website around the teenagers. In particular, the cyberbullying has appeared mainly among the same age friends, it is proved that injurers inflict the harassment mainly at their own place and the ratio of the harassment by one self is higher than many. In addition, it is quite probable that the injurer-student who inflicts the harassment in off-line also can do it in on-line and to attack the cyberbullying is easy to find by the student who is indulged himself in internet use. Therefore, it is presented that the countermeasure in educational side and systematic side on this study. First on the educational side, there are presented the practice of the preventive education against the cyberbullying, expansion of the preventive schools for the cyber ethics and cyber crime and strengthening of the guideline for students in cyberspace. Second on the systematic side, there are presented the appointment of various committee, to strengthen the protection of damaged students, preparation of laws for cyberbullying, expansion of information office for internet addiction, improvement of the system for the school custodian and to extend the operating for cyber clearness school.

Authority of Image in Internet Space

  • Jang, Seo-Youn;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.153-158
    • /
    • 2019
  • Language and letter are represented by a combination of its signifier and signified. All symblos are commonly calling direct attention to people who are living in the physical world. However, in cyberspace, the image takes control once inhabited by the language. Cyberspace with anonymity and deoent physical nature has something with physical laws. In this space the statue transcends the imaginary realm. Ideology gives a greater connotation by giving a series of regulation to images floating in cyberspace. Even if various media have the same image, the meaning of the image changes depending on which ideology is used. The impact of this on the public is great. In this study, I discuss the ideology in cyberspace where is supposedly wide open to who visits and spreads all the thoughts without suppression and the human body. The main ideas would be who owns the ideology and what does it want to control and how the people would react to the ideology. This paper would eventually head the prototype that visualizes above ideas. Though the interactive media it will also show the subject in the real world is accept the images floating in the cyberspace without any doubts.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

Analysis of evacuation time for New publicly used establishments according to whether safety facilities, etc. are installed

  • Hong-Sang Lee;Ha-Sung, Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.49-59
    • /
    • 2023
  • In accordance with the revision of "Special act on the safety control of publicly used establishments", this study is aim to measure the change in evacuation time due to whether safety facilities, etc. are installed of a room escape cafe business and kids cafe business(hereinafter referred to as "New publicly used establishments"), which were added as new targets of the publicly used business from June 8, 2022. In the case of new publicly used establishments or publicly used establishments whose owners are changed after the revision of the relevant laws, safety facilities, etc. are installed and maintained under the "Special act on the safety control of publicly used establishments", but in the case of existing businesses that have been operating even before the revision of the law, the business continues without safety facilities, etc. installed because the revised law is not retroactively applied. The purpose of this study is to compare and analyze the change in evacuation time by measuring the evacuation time to operating before the revision of the law to simulate evacuation at existing new publicly used establishments without safety facilities, etc. and measure the evacuation time at new publicly used establishments with safety facilities after the revision of the law