Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 20, Issue 4 - Nov 2015
Volume 20, Issue 3 - Aug 2015
Volume 20, Issue 2 - May 2015
Volume 20, Issue 1 - Feb 2015
Selecting the target year
A Case Study on the Implementation of a River Water Level Monitoring System using PLC(Programmable Logic Controller) and Public Telecommunication Network
Kim, Seokju ; Kim, Minsoo ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 1~17
DOI : 10.7838/jsebs.2015.20.4.001
A river water level monitoring system which prevents salt water damages and effectively excludes floods has been developed to contribute efficient operation of Nakdong river estuary barrage. The system can be used for monitoring upstream conditions more quickly and do appropriate responses over changes. Telemetry and telecontrols using PLCs have been built at the three sites that directly influence on the operation of barrage gates, and are linked to Nakdong river estuary barrage's IOS (Integrated Operation System) through public communication networks. By using PLC, the system can achieve even higher reliability and versatility than before as well as easy management. By power control devices, we can remotely control the power of PLCs to treat the minor troubles instantly without going on-sites. The power control devices also save data in preparation for the cases of communication failures. The system uses ADSL (FTTH) as a main network between SCADA server and PLCs, and CDMA (M2M) as a secondary network. In order to compensate security vulnerabilities of public communication network, we have installed the VPNs for secure communication between center and the observation stations, just like a dedicated network. Generally, river water level observations have been used custom-manufactured remote terminals to suit their special goals. However, in this case, we have established a system with open architecture considering the interface between different systems, the ease of use and maintenance, security, price, etc.
The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach
Lee, Saerom ; Jahng, Jungjoo ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 19~39
DOI : 10.7838/jsebs.2015.20.4.019
Internet of Things (IoT) is expected to provide efficiency and convenience in human life by integrating the Internet into the things that we use in daily lives. IoT can not only create new businesses but also can bring great changes in our lives thanks to the various ways of technical application: defining relationships among things or automatic use of technology by analyzing the usage pattern. This study uses the qualitative research of interviewing the experts to predict the changes that IoT technology is expected to bring in our lives. In addition, this paper analyzes news articles about internet of things in Korea using text-network analysis. This study also discusses the factors which need to be considered to put IoT into successful use in business contexts.
The use of Local API(Anomaly Process Instances) Detection for Analyzing Container Terminal Event
Jeon, Daeuk ; Bae, Hyerim ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 41~59
DOI : 10.7838/jsebs.2015.20.4.041
Information systems has been developed and used in various business area, therefore there are abundance of history data (log data) stored, and subsequently, it is required to analyze those log data. Previous studies have been focusing on the discovering of relationship between events and no identification of anomaly instances. Previously, anomaly instances are treated as noise and simply ignored. However, this kind of anomaly instances can occur repeatedly. Hence, a new methodology to detect the anomaly instances is needed. In this paper, we propose a methodology of LAPID (Local Anomaly Process Instance Detection) for discriminating an anomalous process instance from the log data. We specified a distance metric from the activity relation matrix of each instance, and use it to detect API (Anomaly Process Instance). For verifying the suggested methodology, we discovered characteristics of exceptional situations from log data. To demonstrate our proposed methodology, we performed our experiment on real data from a domestic port terminal.
Automated Development of Rank-Based Concept Hierarchical Structures using Wikipedia Links
Lee, Ga-hee ; Kim, Han-joon ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 61~76
DOI : 10.7838/jsebs.2015.20.4.061
In general, we have utilized the hierarchical concept tree as a crucial data structure for indexing huge amount of textual data. This paper proposes a generality rank-based method that can automatically develop hierarchical concept structures with the Wikipedia data. The goal of the method is to regard each of Wikipedia articles as a concept and to generate hierarchical relationships among concepts. In order to estimate the generality of concepts, we have devised a special ranking function that mainly uses the number of hyperlinks among Wikipedia articles. The ranking function is effectively used for computing the probabilistic subsumption among concepts, which allows to generate relatively more stable hierarchical structures. Eventually, a set of concept pairs with hierarchical relationship is visualized as a DAG (directed acyclic graph). Through the empirical analysis using the concept hierarchy of Open Directory Project, we proved that the proposed method outperforms a representative baseline method and it can automatically extract concept hierarchies with high accuracy.
A Study of Self-Checklist for Personal Information Protection of FinTech Service: For the Simple Payment Service
Kang, Min Soo ; Back, Seung Jo ; Lim, Jong In ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 77~102
DOI : 10.7838/jsebs.2015.20.4.077
FinTech service industry has been growing rapidly around the world. It has driven innovation in financial and payment service industry with different channels such as mobile based on Information and Communications Technology (ICT). However, FinTech service is vulnerable to different security threats due to use the valuable data such as personal information and financial information. It is undeniable that collection and use of those information may increase the possibility of identity theft or privacy breach. In this paper will develop a self-checklist for the Simple Payment service users (Privacy Pragmatists) who want to make a rational decision to protect their personal information. The checklist is going to let the users assess the personal information protection by performing the assessment themself when they use the service. The body of this paper is going to analyze the items of the checklist and through the analysis, will suggest a security policy for personal information protection of FinTech service.
Cloud Computing Strategy Recommendations for Korean Public Organizations: Based on U.S. Federal Institutions' Cloud Computing Adoption Status and SDLC Initiative
Kang, Sang-Baek Chris ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 103~126
DOI : 10.7838/jsebs.2015.20.4.103
Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.
A Study on the Feasibility of 'Lone Wolf' Terrorists in Korea: Focusing on IS Defector Student Kim's On-Line Behavior
Youn, Bonghan ; Lee, Sangjin ; Lim, Jongin ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 127~150
DOI : 10.7838/jsebs.2015.20.4.127
Since 9/11 attack, internet has become a major space for terrorist activities and also emerged as the most important spot of lone wolf terrorists for acquiring tools and radicalization. The accident of student Kim's defection to IS (Islamic state) in January 2015 told us that Korea is not any more "terrorism clearance area" and leaded us to look closely into the possibility of lone wolf terrorist. In this paper, I developed a "lone wolf cyber evolution model" using various materials collected by preceding papers and interviewing investigators and terrorism experts in Korea. I analyze Kim's radicalization process using this model. And I picked and closely looked over some facilitating factors of lone wolf such as multi-cultural socialization, increase of international migrants, expansion alienation hierarchy and ideological conflicts deepening and predicted the possibility of lone wolf. Finally, this paper presents some effective policy measurements against lone wolf terrorism in Korea.
An Empirical Study on Influencing Factors of Using Information Security Technology
Kim, Sang-Hoon ; Lee, Gab-Su ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 151~175
DOI : 10.7838/jsebs.2015.20.4.151
Although three types of the information security measures (technical, physical and managerial ones) are all together critical to maintaining information security in the organizations and should be implemented at the same time, this study aims at providing theoretical basis of establishing and implementing effective managerial security measures. The rationale behind this research objective is that it is very important to effectively perform the managerial security measures to achieve the target performance level of the technical and the physical security measures because main agents of practicing the information security measures in the organizations are staff members even though the technical and the physical ones are well constructed and implemented. In particular, this study intends to develop and propose the theoretical model applicable to providing the way of improving organizational members' intention to use information security technologies since the very intention to use them is essential to effectively establishing and promoting managerial security measures. In order to achieve the objective of this study, the factors critical to influencing upon the intention to use information security technologies are derived through systematically reviewing related theories and previous studies, and then the research model and hypotheses are proposed by logically reasoning the casual relationship among the these factors. Also, the empirical analyses are performed by conducting the survey of the organization members of domestic large companies and analyzing the structural equation model by PLS (Partial Least Squares) method. The significant results of this study can contribute to expanding the research area of managerial information security and can be applied to suggesting the practical guidelines for effectively establishing and implementing the managerial security measures in various organizations.
A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System
Bae, Je-Min ; Kim, Sanggeun ; Chang, Hangbae ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 177~191
DOI : 10.7838/jsebs.2015.20.4.177
Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.
A Study on the Problems and Policy Implementation for Open-Source Software Industry in Korea: Soft System Methodology Approach
Kang, Songhee ; Shim, Dongnyok ; Pack, Pill Ho ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 193~208
DOI : 10.7838/jsebs.2015.20.4.193
In knowledge based society, information technology (IT) has been playing a key role in economic growth. In recent years, it is surprisingly notable that the source of value creation moved from hardware to software in IT industry. Especially, among many kinds of software products, the economic potential of open source was realized by many government agencies. Open source means software codes made by voluntary and open participation of worldwide IT developers, and many policies to promote open source activities were implemented for the purpose of fast growth in IT industry. But in many cases, especially in Korea, the policies promoting open source industry and its ecosystem were not considered successful. Therefore, this study provides the practical reasons for the low performance of Korean open source industry and suggests the pragmatic requisites for effective open source policy. For this purpose, this study applies soft system model (SSM) which is frequently used in academy and industry as a methodology for problem-solving and we link the problems with corresponding policy solutions based on SSM. Given concerns which Korean open source faces now, this study suggests needs for the three different kinds of government policies promoting multiple dimensions of industry: research and development (R&D)-side, supply-side, and computing environment-side. The implications suggested by this research will contribute to implement the practical policy solutions to boost open source industry in Korea.
A Development of Ontology-Based Law Retrieval System: Focused on Railroad R&D Projects
Won, Min-Jae ; Kim, Dong-He ; Jung, Hae-Min ; Lee, Sang Keun ; Hong, June Seok ; Kim, Wooju ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 209~225
DOI : 10.7838/jsebs.2015.20.4.209
Research and development projects in railroad domain are different from those in other domains in terms of their close relationship with laws. Some cases are reported that new technologies from R&D projects could not be industrialized because of relevant laws restricting them. This problem comes from the fact that researchers don't know exactly what laws can affect the result of R&D projects. To deal with this problem, we suggest a model for law retrieval system that can be used by researchers of railroad R&D projects to find related legislation. Input of this system is a research plan describing the main contents of projects. After laws related to the R&D project is provided with their rankings, which are assigned by scores we developed. A ranking of a law means its order of priority to be checked. By using this system, researchers can search the laws that may affect R&D projects throughout all the stages of project cycle. So, using our system model, researchers can get a list of laws to be considered before the project they participate ends. As a result, they can adjust their project direction by checking the law list, avoiding their elaborate projects being useless.
Design and Implementation of Web-Based Support System for Disaster Damage Recovery of SOC Facility
Yoon, Hyuk-Jin ; Lee, Keum-Tark ; Kim, Joo-Sung ; Chang, Tai-Woo ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 227~239
DOI : 10.7838/jsebs.2015.20.4.227
To decrease the damage of infrastructure from the natural disaster, initial reaction and emergent recovery are important. But up to now emergent recovery has mainly focused on the situation notices owing to the lack of technical support. In this paper, we described a web-based support system for disaster damage recovery of facility and electronic documents for requesting support of recovery resources. Recovery methods are decided using the damage recovery scenarios based on the acquired damage information, and the allocated recovery resources information is delivered to the recovery resources owner using the electronic documents. This system could readily be used for disaster response and emergency recovery.
An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure
Shim, Woohyun ;
The Journal of Society for e-Business Studies, volume 20, issue 4, 2015, Pages 241~256
DOI : 10.7838/jsebs.2015.20.4.241
In order to ensure that all firms are cyber-secure, many governments have started to enforce the implementation of various security measures on firms. Prior to the implementation, however, it is vague whether government enforced security measures will be effective for mitigating cyber-security risks. By applying a method for estimating the effectiveness of a mandatory seatbelt law in reducing fatalities from motor vehicle accidents, this study develops an ex ante evaluation method that can approximate the effectiveness of a government enforced security measure in reducing country-wide or industry-wide cyber-security risks. Using data obtained from the Korean Internet and Security Agency, this study then explores how to employ the developed method to assess the effectiveness of a specific security measure in mitigating cyber-security risks, if enforced by the government, and compares the effectiveness of various security measures. The comparison shows that compulsory security training has the highest effectiveness.