DOI QR코드

DOI QR Code

Control Variables of Remote Joint Analysis Realization on the M2M Case

  • Lim, Sung-Ryel (Architect/QA Group, SK C&C) ;
  • Choi, Bo-Yun (Digital Forensic Laboratory, Gyeonggi Provincial Police Agency) ;
  • Lee, Hong-Chul (Dept. of Industrial Management Engineering, College of Engineering, Korea University)
  • Received : 2011.09.01
  • Accepted : 2012.01.09
  • Published : 2012.01.30

Abstract

New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.

Keywords

References

  1. Jos J. M. Trienekens, "Quality specification and metrication, results from a case-study in a mission-critical software domain," in Proc. of Software Qual J(2010), vol. 18, pp. 469-490, 2010. https://doi.org/10.1007/s11219-010-9101-z
  2. Gregory Gay, "Automatically finding the control variables for complex system behavior," Journal of Autom Software Enginnering, vol. 17, pp. 439-468, 2010 https://doi.org/10.1007/s10515-010-0072-x
  3. Cohen MI, "Distributed forensics and incident response in the enterprise," in Proc. of Digital Investigation," vol. 8, Aug. 2011.
  4. Boyun Choi, "A study on the online co-work analysis model affecting digital forensics performance," Ajou University, Sep.2009
  5. Simson L. Garfinkel, "Digital forensics research: The next 10 years," in Proc. of Digital Investigation, vol. 7, 2010.
  6. Boyun Choi, "Digital evidence analysis report on Korea water resources corporation case," Gyeonggi Provincial Police Agency, Sep.2009
  7. Edmund W. Schuster, "Machine-to-machine communication for agricultural systems: An XML-based auxiliary language to enhance semantic interoperability," in Proc. of Computers and Electronics in Agriculture, 2011.
  8. Neyre Tekbiyik, "Energy efficient wireless unicast routing alternatives for machine-to-machine networks," Journal of Network and Computer Applications vol. 34.
  9. A.Hochstein, R.Zarnekow and W.Brenner, "ITIL as common practice reference model for IT service management : formal assessment and implications for practice," in Proc. of the IEEE International Conference one-Technology, e-Commerce, and e-Service, 2005
  10. Min-Chun Pan, "Remote online machine condition monitoring system," Measurement 41, 2008.
  11. Kahvedzic, "DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge," in Proc. of Digital Investigation, vol. 6, pp 23-33, Sep. 2009.
  12. Blake McNaughton, "Designing an evaluation framework for IT service management," in Proc. of Information & Management, vol. 47, 2010.
  13. Lance Hayden, "Designing common control frameworks: A model for evaluating information technology governance, risk, and compliance control rationalization strategies," Journal of Information Security: A Global Perspective, 2009.
  14. Shira A.Scheindlin, "Electronic Discovery and Digital Evidence," A Thomson Reuters, 2009.
  15. Philip Sealey, "Remote frensics," in Proc. of Digital Investigation, vol. 1, pp. 261-265, 2004. https://doi.org/10.1016/j.diin.2004.11.002
  16. Turner P., "Selective and intelligent imaging using digital evidence bags," Journal of Digital Investigation, vol. 3, pp. 59-64, 2006.
  17. Rowlingson R. "A ten step process for forensic readiness. International Journal of Digital Evidence, vol. 2, no. 3, pp. 1-28, 2004.
  18. Ministry of Administration and Security, "Enterprise architecture master plan-Phase2 (2011-2013)," in Proc. of Administrative Report of South Korea.
  19. Pao-Ann Hsiung, "Realtime embedded software design for mobile and ubiquitous zystemsm," Journal of Sign Process Sysems, vol. 59, pp. 13-32, 2010. https://doi.org/10.1007/s11265-008-0268-5
  20. Lingfeng Wang , "Component-based performance-sensitive real-time embedded software," in Proc. of IEEE A&E systems magazine, Jan. 2008
  21. United Stated Government, "IT Dash Board http://www.itdashboard.gov/portfolios," 2011.
  22. Paul P. Antonecchia, "Dashboards for Your Board:Communicating Data Effectively and Efficiently," in Proc. of Physician Executive, vol. 36 , no. 3, pp. 34-7.
  23. Kenneth A. Bollen, "Evaluating effect, composite, and causal indicators in structural equation models," in Proc. of MIS Quarterly, vol. 35, pp. 359-372, Jun.2011,
  24. Sung Ryel Lim. "A study on the knowledge management affecting software project performance," Hankuk University of Foreign Studies, 2001.
  25. Linda Wallace, "Information Security and Sarbanes-Oxley Compliance : An Exploratory Study," Journal of information systems, American Accounting Association, vol. 25, no. 1, pp. 185-211, 2011

Cited by

  1. Factors Affecting Medical Incident Care on WBAN vol.7, pp.5, 2013, https://doi.org/10.3837/tiis.2013.05.007
  2. Mission Critical 공공 정보화 구축 시험평가 개선 지표 연구 vol.16, pp.6, 2015, https://doi.org/10.7472/jksii.2015.16.6.97