• Title/Summary/Keyword: contents protection

Search Result 1,061, Processing Time 0.031 seconds

The Police's Public Safety Infra Construction Plans for the Protection of Victims of Sexual Violence (경찰의 성폭력 범죄피해자 보호를 위한 치안인프라 구축방안)

  • Kim, Hyun-Dong;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.715-723
    • /
    • 2013
  • Following the social consensus for the need to stop sexual violence, the government has amended juvenile sex protection laws to impose fees on education practitioners who do not report sexual crimes against women, and amended the 'domestic violence prevention and victim protection laws' (2012. 2) so that the police can investigate on site. However, regardless of these wide efforts, the reality is that sexual crimes against the socially weak do not seem to be dwindling, raising concerns of the effectiveness of such amendments. Generally sexual crimes are hard to prove, and even if reports are filed, most cases are dropped with non-prosecution disposition. Victims are usually limited to women and children and this leads to secondary victims. As this thesis states, developed countries have a more systematic protection methods than our country. Therefore, the purpose of this thesis lies on the construction of public safety infrastructure for the protection of sexual abuse victims (enhancing safety protocols with related organizations, implementing a bill of rights for the victims, prevention-centered police education, amendments to current law) to limit human rights violations and criminal injuries.

The Effects of Adolescent's Relationships with Parents and School/institute Teachers as Protection Factors for Game Addiction: Comparative Analysis of Elementary, Middle, and High School Levels (청소년 게임중독의 보호요인으로서 청소년과 부모 및 학교·학원 교사와의 관계의 영향: 초·중·고 학교급별 비교분석)

  • Song, Indeok
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.298-314
    • /
    • 2020
  • This study was conducted for the purpose of empirically analyzing the effects of the adolescents' relationships with major adults as the protection factors for their game addiction. Specifically, the discriminatory effects of adolescents' relationships with their parents, school teacher, and educational institute teachers on game addiction among elementary, middle, and high school students were compared. Analyzing the data from "2019 Korean Children and Youth Happiness Index" (N=7,454), it was found that adult relationships are significant factors explaining the level of game addiction even after controlling the influence of adolescents' demographic and social characteristics, game use behavior, and friend relationship factors. In the case of elementary school students, the relationship with their mothers reduces the risk of game addiction, while for middle and high school students, the relationship with fathers acts as a protection factor for game addiction. Meanwhile, the protection effects of the relationship between teenagers and school teachers on game addiction was found only in middle school students, and contrary to expectations, the relationship with the educational institute teacher did not have a significant impact on the game addiction of teenagers. Based on the above major research results, this study discussed on the development of programs and policies for the prevention and intervention of youth game addiction and provided suggestions for the follow-up research in the future.

Gabor Wavelet Analysis for Face Recognition in Medical Asset Protection (의료자산보호에서 얼굴인식을 위한 가보 웨이블릿 분석)

  • Jun, In-Ja;Chung, Kyung-Yong;Lee, Young-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.10-18
    • /
    • 2011
  • Medical asset protection is important in each medical institution especially because of the law on private medical record protection and face recognition for this protection is one of the most interesting and challenging problems. In recognizing human faces, the distortion of face images can be caused by the change of pose, illumination, expressions and scale. It is difficult to recognize faces due to the locations of lights and the directions of lights. In order to overcome those problems, this paper presents an analysis of coefficients of Gabor wavelets, kernel decision, feature point, size of kernel, for face recognition in CCTV surveillance. The proposed method consists of analyses. The first analysis is to select of the kernel from images, the second is an coefficient analysis for kernel sizes and the last is the measure of changes in garbo kernel sizes according to the change of image sizes. Face recognitions are processed using the coefficients of experiment results and success rate is 97.3%. Ultimately, this paper suggests empirical application to verify the adequacy and the validity with the proposed method. Accordingly, the satisfaction and the quality of services will be improved in the face recognition area.

A Study on Family Reunification for the Beneficiaries of Complementary Forms of Protection: Sweden, Ireland, Canada, and Australia (보충적 보호대상자의 가족결합권 연구: 해외사례를 중심으로)

  • Kim, Sookyung;Kim, HeeJoo;Jang, Juyoung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.585-594
    • /
    • 2021
  • As for international migration, family reunification is a key factor for the well-being and social integration of migrants. The UN ensures the right to family unity for the beneficiaries of complementary forms of protection. That includes those who are not recognized as refugees, but are nevertheless at risk of serious harm upon return to their country of origin, and thus are in need of international protection to the same degree as refugees. Although the Korean government provides humanitarian stay permits as complementary forms of protection, it does not guarantee family reunification as it does for refugees. This study aimed to examine the family reunification systems in Sweden, Ireland, Australia and Canada and to propose policy implications for family reunification of humanitarian status holders in Korea. The results showed that these countries commonly ensures the rights to family reunification although permission periods and scope vary by country. This study concludes that the Korean government should develop a legal system to ensure family reunification for humanitarian status holders since it is guaranteed as a basic human right by international covenants and promotes positive integration to countries of stay.

The Protection of Third Parties of the Transactions Made by the Representative Director without Resolution Adopted by the Board of Directors (대표이사의 이사회 결의를 흠결한 거래행위와 제3자의 보호)

  • Shin, Tae-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.392-402
    • /
    • 2022
  • The purpose of this study is to examine the protection of third parties of the transactions made by the representative director without resolution adopted by the board of directors. The legal effect of a transaction conducted by a representative director without board resolution in violation of internal restriction or statutory restriction is at issue. The Supreme Court of Korea('SCK') made a new ruling that revised the prior case law(Supreme Court en banc Decision 2015Da45451, Feb. 18, 2021). The SCK in the subject case proclaimed a legal doctrine that 'a third party acting in good faith' shall be protected according to Article 389(3) and 209(2) of the Korean Commercial Act, except that 'a third party with gross negligence' is considered as 'a person acting in bad faith' and thus is excluded from protection. The subject case law can be evaluated as broadening the scope of protection of the third party. In addition, the subject case is meaningful in that it is balance with the related SCK ruling, which considered a third party with gross negligence as a person acting in bad faith while protecting a third party with ordinary negligence in the case of transactions involving apparent representative directors, etc.

The Influence of UV Irradiation on Stilbene Contents and Gray Mold Incidence in Grapevine Leaves (자외선 조사가 포도잎의 Stilbene 함량 및 잿빛곰팡이병 발생에 미치는 영향)

  • Choi, Seong-Jin
    • Horticultural Science & Technology
    • /
    • v.30 no.5
    • /
    • pp.493-500
    • /
    • 2012
  • In order to confirm the possibility of UV utilization as a means for disease protection in grapevine the stilbene contents and the disease incidence in UV irradiated leaves were investigated. UV irradiation significantly increased the contents of resveratrol, piceatannol and piceid, in them, resveratrol and piceid showed in vitro inhibition of spore germination and mycelium growth of Botrytis cinerea. The accumulation of both the stilbenes in UV irradiated leaves seems to be enough to inhibit the B. cinerea growth, since the formation of necrotic spot on the leaves was considerably inhibited when they were inoculated with the conidial spores of B. cinerea. However the stilbenes were accumulated only in the leaves exposed directly to UV showing a limited translocation ability of the compounds. Thus it would be necessary to develop a method to evenly irradiate the entire crown of plant with UV in order to expect to protect them from disease by UV irradiation.

Fingerprint-Based 1-out-of-n Access Control Technique for Media Service Protection in IPTV Broadcasting System (IPTV의 미디어 서비스 보호를 위한 지문 인식 기반의 1-out-of-n 접근 통제 기법)

  • Lee, Ji-Seon;Rhee, Hyun-Sook;Kim, Hyo-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.687-694
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an emerging technology in which telecommunication and broadcasting technologies are converged. IPTV service providers usually multicast scrambled contents. And only legitimate subscribers who pass the access control can de-scramble and use the contents. In order to ensure revenues, providers oftentimes employ password-based authentication protocols that ensure secure authentication processes between set-top box and smart card. In this paper, we propose a fingerprint-based 1-out-of-n authentication protocol which provides convenient and more secure authentication process in some organizational environments. The proposed scheme shows that only those who provide legitimate fingerprint information can be authenticated even in a situation that both password and smart card are compromised.

Mobile 3D Contents Watermarking Technique Based on Buyer-Seller Watermarking Protocol (Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Bae, Sung-Ho;Park, Jae-Bum;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8C
    • /
    • pp.788-799
    • /
    • 2007
  • This paper presents a watermarking method for copyright protection and illegal copy prevention of mobile 3D contents. The proposed method embeds copyright information and user's phone number into spatial domain and encryption domain of mobile animation data based on Buyer-Seller watermarking protocol. Furthermore, we insert user's operation key so that only authorized user can play 3D animation game in mobile device. We implemented the proposed method by using mobile animation tool, G3-SDK. From experimental results, we verified that the proposed method is capable of copyright protection and illegal copy prevention since the watermark can be well extracted against geometrical attacks, such as noise addition, data accuracy variableness and data up/down scaling.

CNN Based Face Tracking and Re-identification for Privacy Protection in Video Contents (비디오 컨텐츠의 프라이버시 보호를 위한 CNN 기반 얼굴 추적 및 재식별 기술)

  • Park, TaeMi;Phu, Ninh Phung;Kim, HyungWon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.63-68
    • /
    • 2021
  • Recently there is sharply increasing interest in watching and creating video contents such as YouTube. However, creating such video contents without privacy protection technique can expose other people in the background in public, which is consequently violating their privacy rights. This paper seeks to remedy these problems and proposes a technique that identifies faces and protecting portrait rights by blurring the face. The key contribution of this paper lies on our deep-learning technique with low detection error and high computation that allow to protect portrait rights in real-time videos. To reduce errors, an efficient tracking algorithm was used in this system with face detection and face recognition algorithm. This paper compares the performance of the proposed system with and without the tracking algorithm. We believe this system can be used wherever the video is used.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.