Ajou University repository

Automated detection technique for suspected copyright infringement sitesoa mark
Citations

SCOPUS

2

Citation Export

DC Field Value Language
dc.contributor.authorJeong, Hae Seon-
dc.contributor.authorKwak, Jin-
dc.date.issued2020-12-31-
dc.identifier.issn2288-1468-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/31780-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85099485329&origin=inward-
dc.description.abstractWith the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.-
dc.description.sponsorshipThis research project was supported by Ministry of Culture, Sports and Tourism (MCST), and from Korea Copyright Commission in 2020 (2019-PF-9500).-
dc.language.isoeng-
dc.publisherKorean Society for Internet Information-
dc.subject.meshAutomated detection-
dc.subject.meshAutomation techniques-
dc.subject.meshCopyright holders-
dc.subject.meshCopyright infringement-
dc.subject.meshEfficient detection-
dc.subject.meshFrequency of use-
dc.subject.meshSite detection-
dc.subject.meshUnauthorized sharing-
dc.titleAutomated detection technique for suspected copyright infringement sites-
dc.typeArticle-
dc.citation.endPage4908-
dc.citation.number12-
dc.citation.startPage4889-
dc.citation.titleKSII Transactions on Internet and Information Systems-
dc.citation.volume14-
dc.identifier.bibliographicCitationKSII Transactions on Internet and Information Systems, Vol.14 No.12, pp.4889-4908-
dc.identifier.doi10.3837/tiis.2020.12.015-
dc.identifier.scopusid2-s2.0-85099485329-
dc.identifier.urlhttp://itiis.org/journals/tiis/digital-library/24149-
dc.subject.keywordAutomated Analysis-
dc.subject.keywordCopyright Detection-
dc.subject.keywordCopyright Infringement-
dc.subject.keywordMonitoring-
dc.subject.keywordPiracy Site-
dc.type.otherArticle-
dc.identifier.pissn1976-7277-
dc.description.isoatrue-
dc.subject.subareaInformation Systems-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.