Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, Hae Seon | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2020-12-31 | - |
dc.identifier.issn | 2288-1468 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/31780 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85099485329&origin=inward | - |
dc.description.abstract | With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step. | - |
dc.description.sponsorship | This research project was supported by Ministry of Culture, Sports and Tourism (MCST), and from Korea Copyright Commission in 2020 (2019-PF-9500). | - |
dc.language.iso | eng | - |
dc.publisher | Korean Society for Internet Information | - |
dc.subject.mesh | Automated detection | - |
dc.subject.mesh | Automation techniques | - |
dc.subject.mesh | Copyright holders | - |
dc.subject.mesh | Copyright infringement | - |
dc.subject.mesh | Efficient detection | - |
dc.subject.mesh | Frequency of use | - |
dc.subject.mesh | Site detection | - |
dc.subject.mesh | Unauthorized sharing | - |
dc.title | Automated detection technique for suspected copyright infringement sites | - |
dc.type | Article | - |
dc.citation.endPage | 4908 | - |
dc.citation.number | 12 | - |
dc.citation.startPage | 4889 | - |
dc.citation.title | KSII Transactions on Internet and Information Systems | - |
dc.citation.volume | 14 | - |
dc.identifier.bibliographicCitation | KSII Transactions on Internet and Information Systems, Vol.14 No.12, pp.4889-4908 | - |
dc.identifier.doi | 10.3837/tiis.2020.12.015 | - |
dc.identifier.scopusid | 2-s2.0-85099485329 | - |
dc.identifier.url | http://itiis.org/journals/tiis/digital-library/24149 | - |
dc.subject.keyword | Automated Analysis | - |
dc.subject.keyword | Copyright Detection | - |
dc.subject.keyword | Copyright Infringement | - |
dc.subject.keyword | Monitoring | - |
dc.subject.keyword | Piracy Site | - |
dc.type.other | Article | - |
dc.identifier.pissn | 1976-7277 | - |
dc.description.isoa | true | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.