• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.029 seconds

Design and Implementation of Software Globalization Quality Management Framework (소프트웨어 글로벌화 품질관리 프레임워크 설계 및 구현)

  • Lee, Sei-Young
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Software globalization is becoming more important worldwide but little is known about how globalization technologies are actually carried out in the Korean software industry. In this paper, we have designed Globalization Quality Management (GQM) framework and applied the framework to the industry domestically for the first time. GQM provides a structured and effective way for software organizations to adopt globalization practices and evaluate the results. GQM consists of three main components: 1) software quality management process, 2) globalization support model and 3) globalization assessment model. This framework also supports both plan-driven and iterative/incremental development methods. On the basis of the GQM, a survey study was conducted among software engineering professionals, gathering the data from 31 IT companies across 7 large-scale projects in Korea. The result indicate that the evaluation score for globalization capability is 2.47 and global readiness is 2.55 out of 5 points. Also It said that internationalized product design (32.9%) and global/local product requirements analysis (28%) are needed to be taken care of first.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Cost Performance Evaluation Framework through Analysis of Unstructured Construction Supervision Documents using Binomial Logistic Regression (비정형 공사감리문서 정보와 이항 로지스틱 회귀분석을 이용한 건축 현장 비용성과 평가 프레임워크 개발)

  • Kim, Chang-Won;Song, Taegeun;Lee, Kiseok;Yoo, Wi Sung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.24 no.1
    • /
    • pp.121-131
    • /
    • 2024
  • This research explores the potential of leveraging unstructured data from construction supervision documents, which contain detailed inspection insights from independent third-party monitors of building construction processes. With the evolution of analytical methodologies, such unstructured data has been recognized as a valuable source of information, offering diverse insights. The study introduces a framework designed to assess cost performance by applying advanced analytical methods to the unstructured data found in final construction supervision reports. Specifically, key phrases were identified using text mining and social network analysis techniques, and these phrases were then analyzed through binomial logistic regression to assess cost performance. The study found that predictions of cost performance based on unstructured data from supervision documents achieved an accuracy rate of approximately 73%. The findings of this research are anticipated to serve as a foundational resource for analyzing various forms of unstructured data generated within the construction sector in future projects.

Requirement Analysis for Bio-Information Integration Systems

  • Lee, Sean;Lee, Phil-Hyoun;Dokyun Na;Lee, Doheon;Lee, Kwanghyung;Bae, Myung-Nam
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.11-15
    • /
    • 2003
  • Amount of biological data information has been increasing exponentially. In order to cope with this bio-information explosion, it is necessary to construct a biological data information integration system. The integration system could provide useful services for bio-application developers by answering general complex queries that require accessing information from heterogeneous bio data sources, and easily accommodate a new database into the integrated systems. In this paper, we analyze architectures and mechanisms of existing integration systems with their advantages and disadvantages. Based on this analysis and user requirement studies, we propose an integration system framework that embraces advantages of the existing systems. More specifically, we propose an integration system architecture composed of a mediator and wrappers, which can offer a service interface layer for various other applications as well as independent biologists, thus playing the role of database management system for biology applications. In other words, the system can help abstract the heterogeneous information structures and formats from the application layer. In the system, the wrappers send database-specific queries and report the result to the mediator using XML. The proposed system could facilitate in silico knowledge discovery by allowing combination of numerous discrete biological information databases.

  • PDF

The Academic Information Analysis Service using OntoFrame - Recommendation of Reviewers and Analysis of Researchers' Accomplishments - (OntoFrame 기반 학술정보 분석 서비스 - 심사자 추천과 연구성과 분석 -)

  • Kim, Pyung;Lee, Seung-Woo;Kang, In-Su;Jung, Han-Min;Lee, Jung-Yeoun;Sung, Won-Kyung
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.431-441
    • /
    • 2008
  • The academic information analysis service is including automatic recommendation of reviewers and analysis of researchers' accomplishments. The service of recommendation of reviewers should be processed in a transparent, fair and accountable way. When selecting reviewers, the following information must be considered: subject of project, reviewer's maj or, expertness of reviewer, relationship between applicant and reviewer. The analysis service of researchers' accomplishments is providing statistic information of researcher, institution and location based on accomplishments including book, article, patent, report and work of art. In order to support these services, we designed ontology for academic information, converted legacy data to RDF triples, expanded knowledge appropriate to services using OntoFrame. OntoFrame is service framework which includes ontology, reasoning engine, triple store. In our study, we propose the design methodology of ontology and service system for academic information based on OntoFrame. And then we explain the components of service system, processing steps of automatic recommendation of reviewers and analysis of researchers' accomplishments.

Metaliteracy Research Trends Analysis: Focused on the Difference from Information Literacy (메타리터러시 연구동향 분석 - 정보 리터러시와의 차이를 중심으로 -)

  • Soram Hong;Wookwon Chang
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.2
    • /
    • pp.97-122
    • /
    • 2023
  • Metaliteracy is a new framework that reframes information literacy. Metaliteracy is distinguished from information literacy through the intruduction of postmodernism, social constructivism and metacognition. However it has been not examined whether metaliteracy studies reflect the conceptual differences. Therefore, The purpose of the study is to observe research trends of metaliteracy on the difference from information literacy. In the study, literature reviews were conducted, and frequency analysis and knowledge network analysis(co-occurrence and bibliographic coupling) were conducted for 80 metaliteracy studies. The results of the study are as follows. As a result of co-occurrence analysis, metacognition(frequency 1st) and skills(degree centrality 1st, closeness centrality 1st, betweenness centrality 1st) appeared. Since metaliteracy criticizes skill-based information literacy, the result suggests that the concepts of information literacy and metaliteracy are mixed. On the other hand, as a result of bibliographic coupling analysis, studies with high bibliographic coupling explain the difference between information literacy and metaliteracy through metacognition.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).

Performance Evaluation Index of TRM: A Korean Case for SMEs

  • Park, SunYoung;Son, JongKu;Seo, JuHwan;Seo, Jinny
    • Asian Journal of Innovation and Policy
    • /
    • v.2 no.1
    • /
    • pp.63-96
    • /
    • 2013
  • There is the need for performance evaluation and the identification of key success factors for utilizing technology roadmaps (TRM), but relevant research does not yet exists in this field. In Korea, the Small and Medium Business Administration has implemented the "Support Program for the Individual Company Technology Roadmaps" to promote the establishment of technology development strategies by SMEs. This study developed the framework and indices for performance analysis, designed and implemented survey for TRM performance analysis, and analyzed TRM performance of the companies that have participated in the above program from 2008 to 2011. This study compared the supported 97 companies and 102 companies not supported and analyzed quantitative and qualitative performance and satisfaction levels among the supported companies to compare low-performance companies and high-performance companies. This study aims to examine the KSF of TRM in terms of input and process. Also we suggested significant insights into the performance of TRM in terms of output.