• Title/Summary/Keyword: Discovery

Search Result 3,507, Processing Time 0.03 seconds

Design and Implementation of a tool for ESI Categorization and Search in e-Discovery (e-Discovery를 위한 오픈 소스 기반의 ESI 분류 및 검색 도구 설계 및 구현)

  • Kim, Hun;Lee, Tae-Rim;Shin, Sang-Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.819-822
    • /
    • 2011
  • 2006년 12월 1일 FRCP 개정안이 발표되면서 e-Discovery를 제정함으로 기업 시스템 내의 ESI에 대한 통합적인 관리가 필요하게 되었다. e-Discovery는 시스템 내의 ESI들을 모두 검토해야 함으로 비용과 시간을 줄이기 위한 e-Discovery 지원 도구가 필요하다. 하지만 국내의 e-Discovery 분야는 거의 시작단계이거나 이제 시작해야 하는 단계라고 볼 수 있으며, e-Discovery 지원 도구들은 외국산 s/w가 대부분이다. 본 논문에서는 e-Discovery 분야에서 가장 중요하다고 볼 수 있는 ESI 수집을 위해 이용되는 여러 e-Discovery 도구들의 기능을 분석하여 어떤 시스템에도 유연성있게 구축될 수 있는 개방적인 오픈소스 기반의 ESI 수집 지원 도구의 설계를 제안한다.

E-Discovery Process Model and Alternative Technologies for an Effective Litigation Response of the Company (기업의 효과적인 소송 대응을 위한 전자증거개시 절차 모델과 대체 기술)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.287-297
    • /
    • 2012
  • In order to prepare for the introduction of the E-Discovery system from the United States and to cope with some causable changes of legal systems, we propose a general E-Discovery process and essential tasks of the each phase. The proposed process model is designed by the analysis of well-known projects such as EDRM, The Sedona Conference, which are advanced research for the standardization of E-Discovery task procedures and for the supply of guidelines to hands-on workers. In addition, Machine Learning Algorithms, Open-source libraries for the Information Retrieval and Distributed Processing technologies based on the Hadoop for big data are introduced and its application methods on the E-Discovery work scenario are proposed. All this information will be useful to vendors or people willing to develop the E-Discovery service solution. Also, it is very helpful to company owners willing to rebuild their business process and it enables people who are about to face a major lawsuit to handle a situation effectively.

Effective Domestic e-Discovery Procedures (국내 특성을 반영한 e-Discovery 대응절차)

  • Lee, Shin-Hyung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1171-1183
    • /
    • 2016
  • Today, many domestic companies often face the lawsuits from the U.S. companies as they expand their business in the U.S. market and it is necessary for the domestic companies to prepare for the e-Discovery process in the systematic manner. Yet, the e-discovery system has not been properly established in Korea, however, domestic companies are growing more and more interests in e-Discovery processes and procedures so that they are seeking for the appropriate actions that they should take when facing lawsuits. When adopting the e-Discovery system in Korea, there are three main considerations including the differences in laws and regulations, enterprise system and language and company culture. This study aims to draw the problems for the Korean domestic companies in responding the U.S. lawsuits and to suggest the specialized e-discovery processes and procedures to effectively overcome them.

A Study on an Improved DDS Discovery Method for a Large-scale System

  • Jeong, Yeongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.51-58
    • /
    • 2020
  • The DDS discovery is a behind-the-scenes way in which DDS objects on different nodes find out each other in a same domain. If the DDS discovery takes a long time, the preparation time for DDS communication is also delayed. And if the DDS discovery between several nodes fails, DDS communication between nodes related to them would be also failed. This problems can be a big cause of overall system performance degradation. Therefore, the improvement of performance for the DDS discovery gives the effect that improves the performance of the entire system. In this paper, I propose an efficient new method which improves the performance and reduces the time of DDS discovery. I simulate both the origin and the new proposed method for DDS discovery, and I compare the result of performance. This result will help for improving a DDS discovery in a large-scale system.

A Study on Quality Evaluation of Discovery Central Index - the Case of EDS(EDSCO Discovery Service) - (디스커버리(Discovery) 통합색인의 품질평가에 관한 연구 - EDS를 사례로 하여 -)

  • Lee, Eun-Ju
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.3
    • /
    • pp.415-440
    • /
    • 2014
  • This study intends to make a comprehensive inquiry into the meaning and limitations of Discovery, and to explore how to make full use of Discovery in library cataloging. To this end, first discussed is the meaning of Discovery, which has a variety definitions. For the quality evaluation, 5 criteria were developed on the basis of literature review. Then this study conducted the quality evaluation on the basis of previously developed 5 criteria and usefulness of Discovery in library catalogs is thoroughly discussed. Based on these, the final discussion includes strategies for Korean LIS scholars and library practitioners to consider when applying Discovery as an integrated search tool.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

A Study of Authentication and encryption for e-Discovery Forensic Data (e-Discovery 포렌식 자료를 위한 위기대응관제시스템 인증 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.185-189
    • /
    • 2011
  • GM대우차와 쌍용차에 관한 기술 유출 사고에서의 국가 경제적인 피해로 인하여 e-Discovery 제도 도입과 연구가 필요하다. 본 논문에서는 e-Discovery에 개념과 관련법안 및 권고안, 포렌식 수사절차에 대해 연구하고, 한국의 e-Discovery 사고 사례를 연구하고, e-Discovery가 도입되면 포렌식 자료를 위한 보안관제시스템에서의 인증과 암호화를 연구하였다. 보안관제시스템의 접근과 인증을 위한 사용자인증과 기기인증에 대한 기술과 암호화 기술을 연구하였다. 본 논문 연구를 통하여 e-Discovery 제도의 도입과 포렌식 기술 발전에 기초자료로 활용될 것이다.

  • PDF