Browse > Article
http://dx.doi.org/10.3837/tiis.2012.01.006

Control Variables of Remote Joint Analysis Realization on the M2M Case  

Lim, Sung-Ryel (Architect/QA Group, SK C&C)
Choi, Bo-Yun (Digital Forensic Laboratory, Gyeonggi Provincial Police Agency)
Lee, Hong-Chul (Dept. of Industrial Management Engineering, College of Engineering, Korea University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.1, 2012 , pp. 98-115 More about this Journal
Abstract
New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.
Keywords
Ubiquitous system; M2M control mechanism; mission critical system; information technology supervision & governance; control variables; remote forensic; Product development process; quality metrics;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 1
연도 인용수 순위
  • Reference
1 Simson L. Garfinkel, "Digital forensics research: The next 10 years," in Proc. of Digital Investigation, vol. 7, 2010.
2 Neyre Tekbiyik, "Energy efficient wireless unicast routing alternatives for machine-to-machine networks," Journal of Network and Computer Applications vol. 34.
3 A.Hochstein, R.Zarnekow and W.Brenner, "ITIL as common practice reference model for IT service management : formal assessment and implications for practice," in Proc. of the IEEE International Conference one-Technology, e-Commerce, and e-Service, 2005
4 Min-Chun Pan, "Remote online machine condition monitoring system," Measurement 41, 2008.
5 Kahvedzic, "DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge," in Proc. of Digital Investigation, vol. 6, pp 23-33, Sep. 2009.
6 Blake McNaughton, "Designing an evaluation framework for IT service management," in Proc. of Information & Management, vol. 47, 2010.
7 Lance Hayden, "Designing common control frameworks: A model for evaluating information technology governance, risk, and compliance control rationalization strategies," Journal of Information Security: A Global Perspective, 2009.
8 Shira A.Scheindlin, "Electronic Discovery and Digital Evidence," A Thomson Reuters, 2009.
9 Philip Sealey, "Remote frensics," in Proc. of Digital Investigation, vol. 1, pp. 261-265, 2004.   DOI   ScienceOn
10 Turner P., "Selective and intelligent imaging using digital evidence bags," Journal of Digital Investigation, vol. 3, pp. 59-64, 2006.
11 Rowlingson R. "A ten step process for forensic readiness. International Journal of Digital Evidence, vol. 2, no. 3, pp. 1-28, 2004.
12 Ministry of Administration and Security, "Enterprise architecture master plan-Phase2 (2011-2013)," in Proc. of Administrative Report of South Korea.
13 Pao-Ann Hsiung, "Realtime embedded software design for mobile and ubiquitous zystemsm," Journal of Sign Process Sysems, vol. 59, pp. 13-32, 2010.   DOI   ScienceOn
14 Lingfeng Wang , "Component-based performance-sensitive real-time embedded software," in Proc. of IEEE A&E systems magazine, Jan. 2008
15 United Stated Government, "IT Dash Board http://www.itdashboard.gov/portfolios," 2011.
16 Paul P. Antonecchia, "Dashboards for Your Board:Communicating Data Effectively and Efficiently," in Proc. of Physician Executive, vol. 36 , no. 3, pp. 34-7.
17 Boyun Choi, "Digital evidence analysis report on Korea water resources corporation case," Gyeonggi Provincial Police Agency, Sep.2009
18 Edmund W. Schuster, "Machine-to-machine communication for agricultural systems: An XML-based auxiliary language to enhance semantic interoperability," in Proc. of Computers and Electronics in Agriculture, 2011.
19 Kenneth A. Bollen, "Evaluating effect, composite, and causal indicators in structural equation models," in Proc. of MIS Quarterly, vol. 35, pp. 359-372, Jun.2011,
20 Sung Ryel Lim. "A study on the knowledge management affecting software project performance," Hankuk University of Foreign Studies, 2001.
21 Linda Wallace, "Information Security and Sarbanes-Oxley Compliance : An Exploratory Study," Journal of information systems, American Accounting Association, vol. 25, no. 1, pp. 185-211, 2011
22 Boyun Choi, "A study on the online co-work analysis model affecting digital forensics performance," Ajou University, Sep.2009
23 Jos J. M. Trienekens, "Quality specification and metrication, results from a case-study in a mission-critical software domain," in Proc. of Software Qual J(2010), vol. 18, pp. 469-490, 2010.   DOI   ScienceOn
24 Gregory Gay, "Automatically finding the control variables for complex system behavior," Journal of Autom Software Enginnering, vol. 17, pp. 439-468, 2010   DOI   ScienceOn
25 Cohen MI, "Distributed forensics and incident response in the enterprise," in Proc. of Digital Investigation," vol. 8, Aug. 2011.