생성형 인공지능 관련 범죄 위협 분류 및 대응 방안

Vol. 34, No. 2, pp. 301-321, 4월. 2024
10.13089/JKIISC.2024.34.2.301, Full Text:
Keywords: Artificial intelligence, Generative Artificial Intelligence, Generative AI Crimes, Crime Taxonomy
Abstract

Generative artificial intelligence is currently developing rapidly and expanding industrially. The development of generative AI is expected to improve productivity in most industries. However, there is a probability for exploitation of generative AI, and cases that actually lead to crime are emerging. Compared to the fast-growing AI, there is no legislation to regulate the generative AI. In the case of Korea, the crimes and risks related to generative AI has not been clearly classified for legislation. In addition, research on the responsibility for illegal data learned by generative AI or the illegality of the generated data is insufficient in existing research. Therefore, this study attempted to classify crimes related to generative AI for domestic legislation into generative AI for target crimes, generative AI for tool crimes, and other crimes based on ECRM. Furthermore, it suggests technical countermeasures against crime and risk and measures to improve the legal system. This study is significant in that it provides realistic methods by presenting technical countermeasures based on the development stage of AI.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
박우빈, 김민수, 박윤지, 유혜진, 정두원, "Taxonomy and Countermeasures for Generative Artificial Intelligence Crime Threats," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 2, pp. 301-321, 2024. DOI: 10.13089/JKIISC.2024.34.2.301.

[ACM Style]
박우빈, 김민수, 박윤지, 유혜진, and 정두원. 2024. Taxonomy and Countermeasures for Generative Artificial Intelligence Crime Threats. Journal of The Korea Institute of Information Security and Cryptology, 34, 2, (2024), 301-321. DOI: 10.13089/JKIISC.2024.34.2.301.