Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Information Systems
Journal Basic Information
Journal DOI :
The Korea Association of Information Systems
Editor in Chief :
Volume & Issues
Volume 14, Issue 3 - Dec 2005
Volume 14, Issue 2 - Dec 2005
Volume 14, Issue 1 - Jan 2005
Selecting the target year
A Role-driven Security and Access Control Model for Secured Business Process Management Systems
Won Jae-Kang ; Kim Kwang-Hoon ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 1~8
This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.
Performance Analysis of Web Service Architecture for Inter-AS DiffServ-over-MPLS Traffic Engineering
Sundaram Shanmugham ; Chae Youngsu ; Kim Young-Tak ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 9~16
In this paper, the performance of the WebService architecture for QoS guaranteed connection provisioning in inter-AS domain networks has been measured and analyzed for service publish/inquiry, collection of NMSs ASBR details, source routing by ingress NMS in constraint based routing and connection establishment. From the analysis, it has been found that, the connection between inter-AS domain networks can be established within the usual time limits of 3 seconds by the Web Service architecture. Since no standard solutions have been implemented in Interdomain QoS provisioning, this performance analysis assures Web Service architecture as a promising solution and can be easily implemented in the early stages of MPLS network employment.
Hierarchical Structured Multi-agent for Distributed Databases in Location Based Services
Mateo Romeo Mark A. ; Lee Jaewan ; Kwon Oh-Hyun ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 17~22
Location management is very important in location-based services to provide services to the mobile users like banking, city guides and many more. Ubiquitous and mobile devices are the source of data in location management and its significant operations are update and search method. Some studies to improve these were presented by using optimal sequential paging, location area scheme and hierarchical database scheme. In addition, not all location services have the same access methods on data and it lead to difficulties of providing services. A proposed location management of multi-agent architecture is presented in this study. It shows the coordination of the agents on the distributed database of location-based services. The proposal focuses on the location management of the mobile object presented in a hierarchical search and update. Also, it uses a nearest neighbor technique for efficient search method of mobile objects.
Soft Systems are Ubiquitous-Defenses are Rare: A Case for Contingent Outsourcing of Patch Management
Arnett Kirk P. ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 23~30
Computer attacks on vulnerable software are ubiquitous. Today's attacks on client PCs can be used to create armies of zombie computers that are capable of wide reach attacks on high profile businesses and governments. The simple act of patching software vulnerabilities will certainly mitigate this problem, but patching has its own set of problems. Further, it is frequently the case that patches which are available to mitigate vulnerabilities are not being made on a timely basis and sometimes are not being made at all. One solution to the patch management dilemma is outsourcing. This paper notes that outsourcing is not a carte blanche decision that can be made based on dollars, but rather that a contingency decision matrix can provide guidance on outsourcing solutions for patch management and other security components as well. The matrix recognizes that IS staff expertise and employee security awareness are two important factors in the outsourcing decision.
Enhancing Collaboration in Textile e-Marketplace Supply Chains
Hwang, Ha-Jin ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 31~36
Firms seldom survive and prosper solely through their individual efforts. Each firm's performance depends upon the activities and performance of others and hence upon the nature and quality of the direct and indirect relationships a firm develops with its counterparts. Textile companies have tried to improve their organizational competitiveness in order to survive in the digital age global market. The challenge in textile supply chain management is the development of collaboration network which accommodates diverse concerns of various participants while explicitly recognizing interdependencies and promoting effective relationship management. Major contents of the study are as follows. First, ideal collaboration network model from the supply chain of the textile industry is suggested. Second, utilizing the collaboration model, A framework for textile e-marketplaces supply chians is designed to improve customer services and delivery time, to promote information sharing, and shorten product life cycle time. The framework suggested is expected to promote corporate innovation and information sharing, generate infrastructure which provides appropriate communication and operations capabilities for the textile companies.
Encoding of XML Elements for Mining Association Rules
Hu Gongzhu ; Liu Yan ; Huang Qiong ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 37~47
Mining of association rules is to find associations among data items that appear together in some transactions or business activities. As of today, algorithms for association rule mining, as well as for other data mining tasks, are mostly applied to relational databases. As XML being adopted as the universal format for data storage and exchange, mining associations from XML data becomes an area of attention for researchers and developers. The challenge is that the semi-structured data format in XML is not directly suitable for traditional data mining algorithms and tools. In this paper we present an encoding method to encode XML tree-nodes. This method is used to store the XML data in Value Table and Transaction Table that can be easily accessed via indexing. The hierarchical relationship in the original XML tree structure is embedded in the encoding. We applied this method to association rules mining of XML data that may have missing data.
Frameworks and Environments for Mobile Agents
Kim Haeng Kon ; Chung Youn-Ky ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 48~52
The Mobile agent-based distributed systems become obtaining significant popularity as a potential vehicle to allow software components to be executed on heterogeneous environments despite mobility of users and computations. However, as these systems generally force mobile agents to use only common functionalities provided in every execution environment, the agents may not access environment-specific resources. In this paper, we propose a new framework using Aspect Oriented Programming technique to accommodate a variety of static resources as well as dynamic ones whose amount is continually changed at runtime even in the same execution environment. Unlike previous works, this framework divides roles of software developers into three groups to relieve application programmers from the complex and error prone parts of implementing dynamic adaptation and allowing each developer to only concentrate on his own part. Also, the framework enables policy decision makers to apply various adaptation policies to dynamically changing environments for adjusting mobile agents to the change of their resources.
The HCARD Model using an Agent for Knowledge Discovery
Gerardo Bobby D. ; Lee Jae-Wan ; Joo Su-Chong ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 53~58
In this study, we will employ a multi-agent for the search and extraction of data in a distributed environment. We will use an Integrator Agent in the proposed model on the Hierarchical Clustering and Association Rule Discovery(HCARD). The HCARD will address the inadequacy of other data mining tools in processing performance and efficiency when use for knowledge discovery. The Integrator Agent was developed based on CORBA architecture for search and extraction of data from heterogeneous servers in the distributed environment. Our experiment shows that the HCARD generated essential association rules which can be practically explained for decision making purposes. Shorter processing time had been noted in computing for clusters using the HCARD and implying ideal processing period than computing the rules without HCARD.
Development of Personal EPG for Purpose-oriented Broadcasting
Lee Yun-Ju ; Lim Tae-Beom ; Kim Yoon-Sang ; Lee Seok-Pil ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 59~62
The recent broadcasting environment has shifted to embrace multimedia and multi-channel features through terrestrial, satellite and cable media. This has multiplied the number of broadcasting programs. With the information on a myriad of programs provided to TV viewers, information overload occurs, and thus, the TV viewing environment is shifting to one where viewers cannot select programs passively. Thus, a growing need is emerging to ensure a personalized electronic program guide (EPG) to help individuals select TV programs according to their taste. This paper presents a personalized EPG that enables a purpose-oriented broadcasting service to provide personalized broadcasting programs in tune with the user's requirements and preferences.
A Study on Information System Improvement for Air Logistics SCM
Choi, Hyung-Rim ; Park, Nam-Kyu ; Lee, Hyun-Chul ; Seo, Young-Joon ; Shin, Joong-Jo ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 63~70
Compared with land logistics and sea logistics, air logistics takes not only less transportation time, but also makes just-in-time delivery possible. Because of this, in spite of high freight rates, many shippers make good use of airlines. To cope with borderless competition in this global age, most shippers using air logistics want to receive diverse information including just-in-time cargo delivery and dangerous situation as well as convenience and speed in job handling. Nevertheless, most domestic forwarders, who perform many kinds of important businesses for air logistics, mainly put emphasis on demanding information from overseas partners through their business agreements, that is, focusing on horizontal integration, instead of sharing information or improving job performance among air logistics participants. As a result, it is almost impossible to satisfy the needs of shippers. Airline users want to remove the uncertainties over their cargo movement. And in time of emergency, they want to take immediate measures through speedy information sharing and decision-making. In order to satisfy shipper's needs, all the organizations participating in the air logistics supply chain-cargo senders, cargo receivers, forwarders, transporters, licensed customs brokers, airlines as well as foreign partners-have to set up a vertical cooperation system. For effective air logistics SCM, it is very important to remove overlapping jobs, strengthen the efficiency of job handling, and provide online monitoring on cargo information in order to support decision-making. To this end, this paper has applied the concept of RTE (Real Time Enterprise), a new business management system, which tries to maximize competitiveness by removing many hindrance factors on an ongoing basis in managing and fulfilling core business processes based on up-to-the-minute information. In order to realize RTE-based information system for air logistics SCM, this paper has analyzed the information required by business process and by air logistics participant, and suggested the method for information sharing, point of time for information input and output, and its means.
Customer Satisfaction, Trust and Loyalty in EC
Kwon Young-Guk ; Park Hyun-Jee ; Lee Sun-Ro ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 71~81
The main purpose of this paper is to investigate the relationship between website environmental characteristics (website characteristics, user characteristics, and external environments), satisfaction, trust and loyalty in tourism e-business (EC). The following results were determined by verifying five hypotheses using LlSREL. Website environments partially support perceived satisfaction and also perceived trust. Satisfaction has a strong effect upon perceived trust while satisfaction doesn't affect perceived loyalty. Trust significantly impacts perceived loyalty in tourism e-business (EC).
Frameworks for Context Recognition in Document Filtering and Classification
Kim Haeng-Kon ; Yang Hae-Sool ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 82~88
Much information has been hierarchically organized to facilitate information browsing, retrieval, and dissemination. In practice, much information may be entered at any time, but only a small subset of the information may be classified into some categories in a hierarchy. Therefore, achieving document filtering (DF) in the course of document classification (DC) is an essential basis to develop an information center, which classifies suitable documents into suitable categories, reducing information overload while facilitating information sharing. In this paper, we present a technique ICenter, which conducts DF and DC by recognizing the context of discussion (COD) of each document and category. Experiments on real-world data show that, through COD recognition, the performance of ICenter is significantly better. The results are of theoretical and practical significance. ICenter may server as an essential basis to develop an information center for a user community, which shares and organizes a hierarchy of textual information.
A Study on Automated Negotiation Methodology for Multi-lateral Concurrent Negotiation
Cho Min-Je ; Choi Hyung Rim ; Kim Hyun Soo ; Hong Soon Goo ; Park Young Jae ; Shim Jung Hoon ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 89~96
Though studies on negotiations have actively been conducted in the field of e-Commerce so far, some problems have yet to be solved and many application fields of negotiation systems exist. Currently, many businesses shift from various fields to e-Commerce market, due to recent social changes and expansion of e-Commerce market; however, we need to develop the study of automated agents to resolve the issue of negotiation, which is an essential element in the e-Commerce, by minimizing human interference under the e-Commerce environment. In this study, we intend to propose a new negotiation protocol considering the negotiation alternatives through continuous negotiation rounds in relation to an automated negotiation issue whose participants are one to N (seller to buyers). We also present an agent-facilitated negotiation methodology by which negotiation alternative generation process is automated, in consideration of buyer's negotiation attributes and strategies in the negotiation system.
Highspeed Packet Processing for DiffServ-over-MPLS TE on Network Processor
Siradjev Djakhongir ; Chae Youngsu ; Kim Young-Tak ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 97~104
The paper proposes an implementation architecture of DiffServ-over-MPLS traffic engineering (TE) on Intel IXP2400 network processor using Intel IXA SDK 4.0 Framework. Program architecture and functions are described. Also fast and scalable range-match classification scheme is proposed for DiffServ-over-MPLS TE that has been integrated with functional blocks from Intel Microblocks library. Performance test shows that application can process packets at approximate data rate of 3.5 Gbps. The proposed implementation architecture of DiffServ-over-MPLS TE on Network processor can provide guaranteed QoS on high-speed next generation Internet, while being flexible and easily modifiable.
Certified Email: A Survey
Curtis Brian ; Seruga Jan ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 105~108
A comparison between various proposals for the provision of certified email is presented. In order to place the proposals in context, an outline of the basic principles of secure email is provided, as far as possible separating the issues of confidentiality, integrity and authenticity.
The effect of learning management system quality and self-regulated learning strategy on effectiveness of an e-Learning
Lee Jong-Ki ; Lee Jang-Hyung ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 109~116
With the increasing use of the Internet improved Internet technologies as well as web-based applications, the uses of e-Learning have also increased the effectiveness of e-Learning has become one of the most practically and theoretically important issues in both Educational Engineering and Information Systems. This study suggests a research model, based on an e-Learning success model, the relationship of the e-learner's self-regulated learning strategy and the quality perception of the e-Learning environment. This research model focuses on the learning environment and on the learners' self-efficacy. The former consists of LMS, learning contents and interaction that are provided by e-Learning and the latter refers to the learners' self-regulated learning strategy. In this study, academic performance was measured by student's real record. We will show the validity of the model empirically, and most of the hypotheses suggested in this model were accepted.
Scene Change Detection using the Automated Threshold Estimation Algorithm
Ko Kyong-Cheol ; Rhee Yang-Won ;
The Journal of Information Systems, volume 14, issue 3, 2005, Pages 117~122
This paper presents a method for detecting scene changes in video sequences, in which the
-test is modified by imposing weights according to NTSC standard. To automatically determine threshold values for scene change detection, the proposed method utilizes the frame differences that are obtained by the weighted
-test. In the first step, the mean and the standard deviation of the difference values are calculated, and then, we subtract the mean difference value from each difference value. In the next step, the same process is performed on the remained difference values, mean-subtracted frame differences, until the stopping criterion is satisfied. Finally, the threshold value for scene change detection is determined by the proposed automatic threshold estimation algorithm. The proposed method is tested on various video sources and, in the experimental results, it is shown that the proposed method is reliably estimates the thresholds and detects scene changes.