Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.5.823

Improved Application Test Data Range Selection Method in a Non-Personal Information Identification Environment  

Baek, Song-yi (Korea University)
Lee, Kyung-ho (Korea University)
Abstract
In the past, when the personal information leakage incident of the three card companies, the computer program development was followed by the same strict electronic financial supervision regulations as the operating environment. However, when developing a computerized program, the application data is being verified with the integrity of the test data being compromised because the identification of the scope of conversion of the test data associated with the application is unclear. Therefore, in this paper, we proved by presenting a process and algorithm for selecting a range of sufficient test data conversion targets associated with a specific application.
Keywords
Test Data Conversion Range; Data Integrity; System Catalog; Table Relationship; 6sigma; DPMO;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Security world, "Strengthen development security, introduce test data conversion system," https://www.boannews.com/media/view.asp?idx=44642, 2014
2 Korea Ministry of Government Legislation, "Regulations for Electronic Banking Supervision of the Financial Supervisory Service," http://www.law.go.kr/administrative_rules/electronic_Financial_supervision_regulations, 2019
3 Korea Internet & Security Agency, "PIMS Certification System Guide," pp. 181-185, Apr. 2017.
4 Yang-Ho Kim, In-Hyun Cho and Kyung-Ho Lee, "A Decision-Making Model for Handling Personal Information Using Metadata," Journal of the Korea Institute of Information Security & Cryptology, 26(1), pp. 259-270, Feb. 2016   DOI
5 Yeong-jin Choi, Jeong-hwan Kim and Kyung-ho Lee, "A Study on Data Security Control Model of the Test System in Financail Institutions," Journal of the Korea Institute of Information Security & Cryptology, 24(6), pp. 1293-1307, Dec. 2014   DOI
6 Klaus Haller, "Test Data Management in Practice," Journal paper of conference, pp. 1-11, 2013
7 Jean-Luc Hainaut, "Introduction to Database Reverse Engineering, LIBD-Laboratory of Database Application Engineering Institut d'Informatique - University of Namur," 24 Sep 2002
8 Purnima Khurana and P Bindal, "Test Data Management," International Journal of Computer Trends, pp. 1-6, 2014
9 Stephanie Chace, "Test Data Management Best Practice," Technical Document, pp. 1-14, 2011
10 Dowming Yeh, Yuwen Li and William Chu, "Extracting entity-relationship diagram from a table-based legacy database," The Journal of Systems and Software, pp. 764-771, 26 July 2007.   DOI
11 DongChan Lee and Sangjin Lee, "Reserach of organized data extraction method for digital investigation in relational database system," Graduate School of Information Management and Security Korea University, pp. 566-571, May 2012.
12 Korea Data Agency, "Data Quality Assessment Procedure Manual, 4th Ed., Prentice Hall," pp. 30-154, Nov. 2005.
13 Korea Data Agency, "SQL basics and usage," http://www.dbguide.net/db.db?cmd=view&boardUid=148190&boardConfigUid=9&categoryUid=216&boardIdx=134&boardStep=1, 2013
14 National Information Society Agency, "Data Quality Management Solution Data Collection," pp. 13, Nov. 2012.
15 Six sigma daily, "Six Sigma Tools: DPU, DPMO, PPM and RTY," https://www.sixsigmadaily.com/dpu-dpmo-ppm-and-rty/, 2020