• Title/Summary/Keyword: illegal

Search Result 1,453, Processing Time 0.025 seconds

Legal View on Recent Cases of the U.S. and Korea on P2P Service (법적 관점에서 본 P2P서비스:미국연방대법원 평결 및 한국의 소리바다 판결)

  • Kim, Eun-Yeong
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.205-223
    • /
    • 2006
  • File sharing through P2P was decided as illegal according to Supreme Court of the U.S. and the Highest Court of Korea in 2005. Metro-Goldwyn-Mayer Studios Inc. et al. v. Grokster, LTD., et al. and Soribada v. Korea Association for Music Providers have the same ground for decision. P2P service company has vicarious liability for illegal file sharing of its customers. Balance between copyright protection and development of technology was considered in that decision. Programmer who will develop new program for free download and copyright holders who will exploit every measures to protect their right may compromise for their mutual benefits.

  • PDF

Risk Assessment and Air Pollution by the Open Burning of Agricultural Waste and Residues (농업폐기물 소각에 따른 대기오염 실태 및 위해성 평가)

  • Kim, Moon-Hyeon;Yang, Won-Ho
    • Journal of Environmental Health Sciences
    • /
    • v.33 no.1 s.94
    • /
    • pp.30-35
    • /
    • 2007
  • Waste policies with waste metering system and recycling in 1995 have contributed to the reduction of solid waste generation. Now rural areas as well as urban areas produce less amount of solid wastes in terms of per capita. However most policies in relation to waste issue have been concentrated in urban areas. Large portion of agricultural waste in rural region are being illegally treated such as open incineration or burned out on the road. In this study, we assessed the atmospheric air quality and health risk by illegal open incineration in rural region. In case of benzene level, worst concentration during illegal open incineration was 0.23 ppm and cancer risk by exposure was estimated to $2.29{\times}10^{-3}$.

A Development Strategy of Harmful Information Protection System (유해정보 선별차단 시스템의 발전방향)

  • 이승민;남택용;장종수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.721-723
    • /
    • 2004
  • As the Internet use has been spreading worldwide, illegal and harmful contents have been increasing on the Internet, which has become a very serious social problem. To prevent children form exposing themselves to such illegal and harmful contents on the Internet, harmful information protection systems have been developed. We examine component technologies of harmful information protection systems including text and image-based filtering solutions as well as url-based filtering solution. Also we examine the related trends and strategies which effectively prevent access to the harmful contents.

  • PDF

DRM System using GStreamer based on DMP (GStreamer를 이용한 DMP기반의 DRM시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Ahn, Sang-Woo;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.445-451
    • /
    • 2008
  • Due to illegal copying and distribution via the internet, the digital media that have been introduced create certain intellectual property issues. Because of this, several intellectual property groups have been created to create and maintain Digital Rights Management systems (DRM), in order to crack down on illegal and unauthorized copying. However, these systems are often created by many different companies, which leads to problems of interoperability. In this paper, we designed and implemented a DRM system with streamer, following the DMP.

A Legal Study on the Promotion of the In-Flight Security Officers System

  • Jin, Seong Hyun;Jeon, Seung Joon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.100-105
    • /
    • 2021
  • The purpose of this study is to provide in-flight security in situations where aviation security is constantly threatened by the increase in illegal interference in aircraft and the threat of terrorism that still exists. It is to identify legal operational problems such as education and qualification of the original system and to propose improvement measures. To this end, the need for revision based on relevant laws and guidelines such as "Operation Guidelines for In-Flight Security Officers" is to be discussed based on international standards such as ICAO and Federal Air Marshal. The research method was based on interviews with SEMs such as cabin managers, which focused on ensuring the legal status of In-Flight Security Officer, establishing relationships with captains, and improving education and training.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

A Study on Preventing Illegal Acts in Electronic Elections (전자투표상에서의 부정 행위 방지에 관한 연구)

  • 박희운;이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.4
    • /
    • pp.95-110
    • /
    • 1998
  • 정보화 사회를 거치면서 네트워크의 발전과 관련해 많은 응용 분야들이 연구되고 있는데, 그 중에서도 암호학을 이용한 전자 투표의 비중이 증대되고 있다. 이러한 전자 투표는 그 중요성에도 불구하고, 아직까지 취약한 점이 많이 산재해 있다. 특히, 전자 투표를 총괄하는 선거 관리 위원회가 부정을 저지를 경우 투표 자체의 신뢰성은 무너지게 되며, 투표권의 매매가 성립할 경우에는 전자 투표에 있어 치명적인 악영향을 미치게 된다. 따라서 본 논문에서는 기존의 투표를 전자 투표로 적용시키는 과정에서 어떠한 요소들이 필요한지 확인해 보고, 선거 관리 위원회의 부정 방지 및 투표 매매 방지를 위한 요구 조건을 살펴볼 것이다.그리고 기존의 전자 투표 방식들이 이러한 위협 요소들에 대해 어떻게 대처하고 있는지를 고찰한 뒤에 더욱 효율적이고 안전한 전자 투표 방식을 제안한다.

Finding Loopholes in Sanctions: Effects of Sanctions on North Korea's Refined Oil Prices

  • KIM, KYOOCHUL
    • KDI Journal of Economic Policy
    • /
    • v.42 no.4
    • /
    • pp.1-25
    • /
    • 2020
  • The international community's sanctions against North Korea, triggered by North Korea's nuclear tests and by missile development in the country, are considered the strongest sanctions in history, banning exports of North Korea's major items and limiting imports of machinery and oil products. Accordingly, North Korea's trade volume decreased to the level of collapse after the sanctions, meaning that the sanctions against North Korea were considered to be effective. However, according to this paper, which analyzed the price fluctuations of refined petroleum products in North Korea through the methodology of an event study, the market prices of oil products were only temporarily affected by the sanctions and remained stable over the long run despite the restrictions on the volumes of refined petroleum products introduced. This can be explained by evidence that North Korea has introduced refined oil supplies that are not much different from those before the sanctions through its use of illegal transshipments even after the sanctions. With regard to strategic materials such as refined oil, the North Korean authorities are believed to be desperately avoiding sanctions by, for instance, finding loopholes in the sanctions to meet the minimum level of demand.

URL Filtering by Using Machine Learning

  • Saqib, Malik Najmus
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.275-279
    • /
    • 2022
  • The growth of technology nowadays has made many things easy for humans. These things are from everyday small task to more complex tasks. Such growth also comes with the illegal activities that are perform by using technology. These illegal activities can simple as displaying annoying message to big frauds. The easiest way for the attacker to perform such activities is to convenience user to click on the malicious link. It has been a great concern since a decay to classify URLs as malicious or benign. The blacklist has been used initially for that purpose and is it being used nowadays. It is efficient but has a drawback to update blacklist automatically. So, this method is replace by classification of URLs based on machine learning algorithms. In this paper we have use four machine learning classification algorithms to classify URLs as malicious or benign. These algorithms are support vector machine, random forest, n-nearest neighbor, and decision tree. The dataset that is used in this research has 36694 instances. A comparison of precision accuracy and recall values are shown for dataset with and without preprocessing.

Development of monitoring system for detecting illegal dumping using deep learning (딥러닝 영상인식을 이용한 쓰레기 무단투기 단속 시스템 개발)

  • Bae, Chang-hui;Kim, Hyeong-jun;Yeo, Jeong-hun;Jeong, Ji-hun;Yun, Tae-jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.287-288
    • /
    • 2020
  • 우리나라의 무단 투기된 쓰레기양은 2019년 2월 기준 33만 톤이며 이를 단속하기 위해 상용화된 쓰레기 무단투기 단속 시스템은 센서를 이용하여 시스템 주변에 사람이 지나가면 영상을 촬영하기 때문에 쓰레기 무단투기자 뿐 아니라 해당 시스템 주변을 지나는 모든 사람을 촬영하기 때문에 불법 쓰레기를 배출하는지 해당 영상을 사람이 일일이 다시 분석해야한다. 본 논문에서는 쓰레기 투기 행위 이미지를 바탕으로 학습시킨 딥러닝 실시간 객체인식 알고리즘인 YOLO-v4를 활용하여 실시간으로 쓰레기 무단투기를 단속하는 시스템을 제시한다.

  • PDF