• Title/Summary/Keyword: contents protection

Search Result 1,060, Processing Time 0.024 seconds

Research Analysis on User's Acceptability of Digital Contents Distribution among Individuals (개인 간 저작물 유통을 위한 사용자의 수용성 조사 분석)

  • Sohn, Bang Yong;Suh, Hye Sun
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.211-217
    • /
    • 2016
  • There have been gradually established paid using system on contents, such as sound source, webtoon etc, with which licences are systematically managed. However, rampant free sites still mostly relying on advertising revenue make difficulties on lots of contents developers and obstruct the protection of their resonable right. In this situation, we need systematic measures to protect copyright of authors and to maximize use of contents of users. Therefore, it is important to handle the convenience of digital contents distribution and the diversity of contents license(differentiating permission rate according to user's purpose, scope, service period etc), based on the need of contents users. This paper implies to guideline to install contents distribution platform of individuals and to apprehend the need and acceptability of users in order to activate digital contents transaction on individuals.

A Design and Implementation of the Source Code Plagiarism Detection System

  • Ahn, Byung-Ryul;Choi, Bae-Young;Kim, Moon-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.319-323
    • /
    • 2005
  • As the software industry develops at a rate speed, anyone can copy or plagiarize without difficulty contents that are becoming digitalized. To make it worse, the development of various contents that be illegally copied and plagiarized are resulting in the increasing infringement on and the plagiarism of the intellectual property. This dissertation tries to put forth the method and the theory to effectively detect any plagiarism of the source code of programs realized in various languages. This dissertation analyzes the advantage and disadvantage of the plagiarism test software, and especially, presents a method to detect possible plagiarism by using the Pattern Matching to overcome its disadvantage. And it also intends to introduce more developed automatic detection system by overcoming the problems with the method of Pattern Matching.

  • PDF

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.

A Study on Efficient Key Management Model for Digital Pay-TV System (디지털 유료 방송시스템에 적합한 키 관리 모델에 관한 연구)

  • Yang Hyung-kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.200-207
    • /
    • 2006
  • Recently, with the development of information and communication technology, digital pay-TV technology is paid attention. So the Protection of the provided contents is becoming more important. However, in order to encourage an active based on digital TV, the contents and information sent and received respectively by the broadcaster and the subscriber must be protected. Therefore, in this paper, I analyze the requirements to protect the digital contents, the security and efficiency of the previous digital pay-TV system model. Then I proposed a key management model for digital pay-TV system.

A Framework for Personal Information Protection in Internet of Things Study on Contents Technology (IoT 환경에서의 개인정보보호 프레임워크)

  • Lee, Yari;Kim, Jung-Sook
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.277-278
    • /
    • 2014
  • 사물인터넷(IoT)은 '개방형 환경에서 인터넷을 기반으로 사람, 사물, 데이터 및 프로세스를 서로 연결하여 정보를 교류하고 상호 소통하는 지능형 인프라'로서 홈 가전, 교통 물류, 건설, 에너지, 헬스케어, 사회안전 등 여러 분야에서 새로운 상품을 개발하고 공급해 창조경제의 핵심동력 가운데 하나가 될 것으로 기대된다. 그러나 네트워크, 서비스, 플랫폼/디바이스 등 기반 환경에서 다양한 개인정보 침해에 대한 위협이 존재하며 개인정보 보호와 기술 활용이라는 이슈에 관한 논의는 아직 초기 단계에 있다. 따라서 본 연구에서는 IoT 환경에서 정보주체의 민감한 개인정보에 대한 안전한 보호 정책 적용과 효율적 정보기술 활용 및 제공이 가능한 개인정보보호 프레임워크를 제안하고자 한다.

  • PDF

Development and Evaluation of Consumer′s Educational Program in Using Credit Card (신용카드 사용에 관한 소비자교육프로그램개발 및 평가)

  • 서인주;두경자
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.12
    • /
    • pp.117-132
    • /
    • 2003
  • This study aims to develop an educational program in using credit card for undergraduate students. In order to achieve this aim, a processor has been followed. first of all, a fundamental work to select the educational contents was Preceded with a survey of learners' needs, case studies of counselling at Consumer Protection Board, and preceding studies. After choice of educational contents, learners' demands on how to manage the educational program was executed in advance. Second, reflecting the above mentioned educational contents, a concrete educational program was built. Based on the constructed plans, both preliminary training and main training were proceeded. Third, to evaluate the effects of the educational program, the knowledge difference, behaviors and attitude changes were all diagnosed. The result suggested that the educational effect was significant in all evaluations section. At last, final program of using credit cards was completed.

Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES

  • Lee, Seungkwang;Choi, Dooho;Choi, Yong-Je
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.1012-1022
    • /
    • 2015
  • Conventional cryptographic algorithms are not sufficient to protect secret keys and data in white-box environments, where an attacker has full visibility and control over an executing software code. For this reason, cryptographic algorithms have been redesigned to be resistant to white-box attacks. The first white-box AES (WB-AES) implementation was thought to provide reliable security in that all brute force attacks are infeasible even in white-box environments; however, this proved not to be the case. In particular, Billet and others presented a cryptanalysis of WB-AES with 230 time complexity, and Michiels and others generalized it for all substitution-linear transformation ciphers. Recently, a collision-based cryptanalysis was also reported. In this paper, we revisit Chow and others's first WB-AES implementation and present a conditional re-encoding method for cryptanalysis protection. The experimental results show that there is approximately a 57% increase in the memory requirement and a 20% increase in execution speed.

Partial Encryption Technique of Digital Contents (디지탈 컨텐츠의 부분 암호화 기법)

  • Hwang, Seon-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.82-87
    • /
    • 2002
  • In the rapidly growing e-business area, the protection of information from hacking or tapping becomes very serious issue. Therefore, the more effective, convenient and secure methods are required to make the e-business more active. in this study, we develop the effective method of protecting digital contents on the public key infrastructure. To do this, we propose the partial encryption scheme to reduce the encryption time, and therefore, to release the server's workload. Our suggested scheme is believed to bring the strong competition to the portal service agents.

A Study on the Importance of Contents in Middle-School Home-Economics (중학교 남.녀학생이 인식한 가정과 교육내용의 중요성에 관한 연구 - 전라북도 남.녀학생을 중심으로-)

  • 박일록
    • Journal of Korean Home Economics Education Association
    • /
    • v.10 no.2
    • /
    • pp.29-42
    • /
    • 1998
  • The purpose of this study was to identify the contents that students want to learn the most on Home-Economics. Participants were 710 middle school students(359 boys and 351 girls) from 9 schools located in 4 cities and 5 counties in CholaBukDo. The results are as follows: 1. Of 32 contents on Family life, boys were interested in 'the puberty', 'pregnancy and the ethics on sex', 'social needs', 'the importance of family relationship', and 'adolescents' physical development'. On the other hand, girls were more intered in 'pregnancy' and 'the ethics on sex', 'the puberty', 'development of career consciousness' and 'career preparation', 'the adolescents' physiolosical and physical development', and 'the importance of family relationship'. 2. Of 37 contents of Managing home resource and Consumer life subarea, boys showed their interests on 'environmental problems', 'environmental conservation', 'environmental pollution', 'management of time and work', 'knowledge', 'management of their abilities'. And girls were more interested in 'environmental conservation', 'environmental pollution', 'environmental problems', 'adolescents life', and 'management of time and work'. 3. Of 49 contents on Dietary life, boys were more interested in 'puberty and the development', 'importance of nutriment', 'nutrition and health' and 'smoking and the health'. However, girls were more interested in 'smoking and health', 'puberty and the development', 'the importance of nutriment', 'nutrition and health', 'a realistic plan to reduce the food-based environmental pollution'. 4. Of 40 contents on Clothing life subarea, while boys were interested in 'the suitable cloths on oneself', 'clothing design', 'regulation of temparature', physical protection' 'merchandising for ready-made clothing'. On the other hand, girls were mostly interested in 'the suitable cloths on oneself', and next 'the clothing design', 'merchandising for ready-made clothes','physical protection', and 'the appropriate posture and physical adornment'. 5. Of 18 contents on Residence life subarea, teachers emphasized the importance of ventilation for adjusting the room environment and students were more interested in the effective use of the residing space. In general, those middle school students in Cheolabukdo showed the biggest interest on 'Clothing life', 'Residence life' the second, 'Eating life' the third, 'Human development and Family relationship' the fourth, and Management of family resource and Consuming life' was their fifth interest. Such result was consistent with Ⅱ-Rok Park's previous research(1997). Since the participants for this study were sampled form 9 schools located in CheolaBukDo, it is not suitable to apply the results nationwide. The restricted sampling must be considered and further studies are needed to make comparisons among areas.

  • PDF