• Title/Summary/Keyword: Online protection

Search Result 257, Processing Time 0.026 seconds

The Method of Digital Copyright Authentication for Contents of Collective Intelligence (집단지성 콘텐츠에 적합한 저작권 인증 기법)

  • Yun, Sunghyun;Lee, Keunho;Lim, Heuiseok;Kim, Daeryong;Kim, Jung-hoon
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.185-193
    • /
    • 2015
  • The wisdom contents consists of an ordinary person's ideas and experience. The Wisdom Market [1] is an online business model where wisdom contents are traded. Thus, the general public could do business activities in the Wisdom Market at ease. As the wisdom contents are themselves the thought of persons, there exists many similar or duplicated contents. Existing copyright protection schemes mainly focus on the primary author's right. Thus, it's not appropriate for protecting the contents of Collective Intelligence that requires to protect the rights of collaborators. There should exist a new method to be dynamic capable of combining and deleting rights of select collaborators. In this study, we propose collective copyright authentication scheme suitable for the contents of Collective Intelligence. The proposed scheme consists of collective copyright registration, addition and verification protocols. It could be applied to various business models that require to combine multiple rights of similar contents or to represent multiple authorships on the same contents.

Suitability of Alternative Dispute Resolution for the Fashion Industry - Focused on Arbitration for the Fashion Industry - (패션산업의 대체적 분쟁해결제도 적합성 - 패션산업의 중재 제도 도입을 중심으로 -)

  • Lee, Jae-Kyoung
    • Journal of Arbitration Studies
    • /
    • v.25 no.1
    • /
    • pp.87-105
    • /
    • 2015
  • Intellectual property law is slowly fighting to keep pace with the rapid growth of the fashion industry. Copyright and patent law have proven only minimally effective in fashion, even in the US and other top fashion nations, forcing designers and fashion companies to rely on their trademarks to protect their work. Litigating trademark disputes in the fashion industry presents a host of problems as witnessed in a recent Christian Louboutin case, leading the parties to resort to Alternative Dispute Resolution(ADR) and Online Dispute Resolution(ODR). ADR methods, especially arbitration, are increasingly emerging as substitutes to litigation. Using these methods, the fashion industry (CFDA in the US case) should sincerely consider a self-regulating program in which its members, both fashion designers and corporations alike, can resolve disputes in a manner mutually beneficial to all parties in order to preserve the industry's growth, solidarity, and esteem In particular, for the US fashion industry, the ongoing Innovative Design Protection and Privacy Prevention Act(IDPPPA) anti-counterfeit legislation could have caused a chilling effect against innovation. New designers with no name and less resources who could normally flourish producing inspired-by designs may find themselves subject to copyright infringement legislation since the IDPPPA may expand the protection of established designers and brands with more resources. This fear and its implication could be solved by the fashion industry itself since fashion experts know best how to handle these fast-paced issues arising in the field. Therefore, stakeholders in the fashion industry should commit to protecting innovation within fashion on a long-term basis by establishing a panel handling an ADR process. This can mitigate the uncertainty created by the IDPPPA or any other legislation from elsewhere, which could result in a shying away from experimentation with inspired-by designs.

A Study on the ODR Dispute Settlement System of Consumer Protection in EU (EU의 소비자보호 ODR 분쟁해결제도에 관한 연구)

  • Park, Jong-Sam
    • Journal of Arbitration Studies
    • /
    • v.28 no.4
    • /
    • pp.89-110
    • /
    • 2018
  • The purposes of this study are as follows: First, this study reviews the Online Dispute Resolution (ODR) regulations of the EU to resolve disputes which can arise in international e-commerce in the future. Second, this study tries to seek out alternative solutions to dispute resolutions based on these regulations. Third, this study increases the efficiency of the transactions by proposing effective and satisfactory dispute resolution methods for international e-commerce. First, this study reviews the concept of cross-border e-commerce, generally explores ODR, and creates comparisons with Alternative Dispute Resolution (ADR). Subsequently, this study looks into domestic ODR system and analyzes the regulations of EU ODR. This study suggests the implications of the European ODR regulations in the conclusion. The EU ODR platform is considered greatly significant in that it has increased the possibility of settlements in small disputes by enhancing consumers' accessibility to ADR procedures. Therefore, this thesis proposes a method for Korean companies to resolve disputes that may arise in e-commerce with EU by using the ODR platform. As a result, it is expected to increase the competitiveness of Korean companies in the EU market. Both legislative trends related to the ODR of the EU and establishment of the EU ODR platform have significant implications for Korean businesses in Europe. This study is expected to be useful for our businesses in the EU in reviewing the applicability of the EU ODR regulations and the dispute settlement procedures through the EU ODR platform. In addition, this study is expected to prove useful in relation to consumer protection by enhancing consumers' accessibility to dispute settlement institutions in domestic electronic commerce.

High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology (불법복제물 고속검색 및 Heavy Uploader 프로파일링 분석기술 연구)

  • Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1067-1078
    • /
    • 2020
  • With the development of internet technology, a lot of content is produced, and the demand for it is increasing. Accordingly, the number of contents in circulation is increasing, while the number of distributing illegal copies that infringe on copyright is also increasing. The Korea Copyright Protection Agency operates a illegal content obstruction program based on substring matching, and it is difficult to accurately search because a large number of noises are inserted to bypass this. Recently, researches using natural language processing and AI deep learning technologies to remove noise and various blockchain technologies for copyright protection are being studied, but there are limitations. In this paper, noise is removed from data collected online, and keyword-based illegal copies are searched. In addition, the same heavy uploader is estimated through profiling analysis for heavy uploaders. In the future, it is expected that copyright damage will be minimized if the illegal copy search technology and blocking and response technology are combined based on the results of profiling analysis for heavy uploaders.

Investigating the acceptance of the reopening Bataan nuclear power plant: Integrating protection motivation theory and extended theory of planned behavior

  • Ong, Ardvin Kester S.;Prasetyo, Yogi Tri;Salazar, Jose Ma Luis D.;Erfe, Justine Jacob C.;Abella, Arving A.;Young, Michael Nayat;Chuenyindee, Thanatorn;Nadlifatin, Reny;Redi, Anak Agung Ngurah Perwira
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.1115-1125
    • /
    • 2022
  • Nuclear power plant (NPP) is currently considered as one of the most reliable power sources. However, 182 of them are considered decommissioned and inactive including the one in Bataan, Philippines. The aim of this study was to investigate the acceptance of the reopening of Bataan Nuclear Power Plant (BNPP) by integrating the Theory of Planned Behavior and Protection Motivation Theory. A total of 815 Filipinos answered an online questionnaire which consisted of 37 questions. The Structural Equation Modeling (SEM) indicated that knowledge towards nuclear power plants was the key factor in determining people's acceptance towards NPP reopening. In addition, knowing the benefits would lead to positive perceived behavioral control (PBC) and attitude towards intention. Results showed that PBC and attitude are mediators towards the acceptance of people regarding the reopening of BNPP. If an individual's knowledge gravitates towards the perceived risk, then this can lead to the negative acceptance of the NPP reopening. On the other hand, if an individual's knowledge gravitates towards the perceived benefits, then this will lead to positive acceptance. This study is the first study that explored the acceptance of the reopening BNPP. Finally, the study's model construct would also be very beneficial for researchers, government, and even private sectors worldwide.

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

Impact of Gender Differences in DNA on Consumer Buying Behavior

  • Kim, Young-Ei
    • Journal of Distribution Science
    • /
    • v.14 no.2
    • /
    • pp.33-39
    • /
    • 2016
  • Purpose The purpose of this study is to investigate the impact of gender differences in DNA on consumer buying behavior both online and offline and other buying channels to find out effective sales promotion strategies of enterprises. Research design, data, and methodology - This study investigated the relation between chromosome and DNA, DNA and gene, and gene and human behavior of gender. The study shows generic characteristics have influence upon consumers' buying behavior and inclination, and examined the effects of genetic characteristics depending upon the difference of gender DNA upon consumers' buying behavior. Results - Precedent studies on genetics and ethology showed close relations between chromosome and DNA, DNA and gene, and gene and buying behavior of the gene. 'Hunting and protection', one of the genetic characteristics in men's DNA, had great influence upon the consumers' different buying behavior. Conclusion - Gender DNA difference in genetics and ethology disclosed fundamental reasons for the difference in buying behavior and inclination of men and women. It gives implications that marketing strategies of advertising and sales promotion should be made in different ways depending upon men and women.

A Study for Considering PMU based Online Transient Stability Assessment (PMU 기반 실시간 과도안정도 판정을 위한 고려사항 검토)

  • Seo, Sang-Soo;Kim, Dong-Joon;Kim, Seog-Joo;Moon, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.218-219
    • /
    • 2011
  • 한전계통에서는 대규모 발전단지 인출 송전선로 고장 시발전기 과도 안정도 향상을 위한 발전기 제어 대책을 수립하여 운영하고 있다. 이러한 대책을 SPS(Special Protection System)이라고 한다. SPS는 인출 송전선로 고장정지에 따른 과도안정도 평가를 오프라인을 통하여 사전에 모의 분석하여 수립된다. 그러나 대상 계통은 보수적 운영을 위해 가장 가혹한 조건을 선정하여 검토한다. 그러나 차단 대수는 검토 대상 계통에 따라 달라질 수 있다. 그래서 필요한 기술이 실시간과도안정도 평가 기술이다. 본 논문에서는 PMU기반의 실시간 과도 안정도 평가시 고려해야할 사항에 대하여 검토하였다.

  • PDF

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.