Ajou University repository

Automated detection technique for suspected copyright infringement sitesoa mark
Citations

SCOPUS

2

Citation Export

Publication Year
2020-12-31
Publisher
Korean Society for Internet Information
Citation
KSII Transactions on Internet and Information Systems, Vol.14, pp.4889-4908
Keyword
Automated AnalysisCopyright DetectionCopyright InfringementMonitoringPiracy Site
Mesh Keyword
Automated detectionAutomation techniquesCopyright holdersCopyright infringementEfficient detectionFrequency of useSite detectionUnauthorized sharing
All Science Classification Codes (ASJC)
Information SystemsComputer Networks and Communications
Abstract
With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/31780
DOI
https://doi.org/10.3837/tiis.2020.12.015
Fulltext

Type
Article
Funding
This research project was supported by Ministry of Culture, Sports and Tourism (MCST), and from Korea Copyright Commission in 2020 (2019-PF-9500).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.