{"title":"A Study on North Korea's Cyber Attacks and Countermeasures","authors":"Minju Chung, Jong-in Lim, Hun-Yeong Kwon","doi":"10.9716/KITS.2016.15.1.067","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.067","url":null,"abstract":"This study aims to present the necessary elements that should be part of South Korea`s National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea`s cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128325958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Emotional Intelligence on Job Satisfaction in China IT Corporation : The Mediating Effect of Organization Culture Awareness","authors":"Suheyong Choi, N. An","doi":"10.9716/KITS.2016.15.1.179","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.179","url":null,"abstract":"Submitted:November 26, 2015 1 st Revision:March 6, 2016 Accepted:March 10, 2016 * 부산대학교 경영학과 부교수, 제1저자 ** 부산대학교 경영학과 박사과정, 공동저자 Popular business magazines continue to highlight the employee’s emotional intelligence in the organization. The purpose of this study is to explore a mediation mechanism of the relationship between emotional intelligence and job satisfaction in China IT corporation. For this, this study focused on examining the influential relationship between employee’s emotional intelligence, Awareness of Self-Emotion, Awareness of other-Emotion, Emotion management, Emotion Control and job satisfaction and the mediating effect of organization culture awareness upon the relationship. Study findings are as follows : First, China IT corporation employee emotional intelligence has a significant positive(+) effect on job satisfaction and is partially supported organization culture awareness. Second, organization culture awareness has partially mediated effect on relationship between emotional intelligence and job satisfaction. In this study, the more employee’s emotional intelligence have a positive impact on job satisfaction and organizational culture. We can designing a support program that emotional intelligence and organization culture awareness for China IT corporation employees will have direct influence upon job satisfaction. Employee’s great talent to make good use of elements of emotional intelligence that promote the work environment and their’s condition and the relationship between employee and employee. Keyword:Emotional Intelligence, Job Satisfaction, Organization Culture Awareness, China It Corporation, Relationship 韓國IT서비스學會誌 第15卷 第1號 2016年 3月, pp.179-195 180 Suheyong Choi.Na An","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodological Implications of Employing Social Bigdata Analysis for Policy-Making : A Case of Social Media Buzz on the Startup Business","authors":"Young‐joo Lee, Dhohoon Kim","doi":"10.9716/KITS.2016.15.1.097","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.097","url":null,"abstract":"Abstract Submitted:October 26, 2015 1 st Revision:January 5, 2016 Accepted:January 7, 2016* 한국정보화진흥원 수석연구원, 정보시스템학 박사, 교신저자** (주)아르스프락시아 대표In the creative economy paradigm, motivation of the opportunity based startup is a continuous concern to policy- makers. Recently, bigdata anlalytics challenge traditional meth ods by providing efficient ways to identify social trend and hidden issues in the public sector. In this study the autho rs introduce a case study using social bigdata analytics for conducting policy analysis. A semantic network analysis was employed using textual data from social media including online news, blog, and private bulletin board which create buzz on the startup business. Results indicates that each media has been forming different discourses regarding governmen t’s policy on the startup business. Furthermore, semantic network structures from private bulletin board reveal unexpected social burden that hiders opening a startup, which has not been found in the traditional survey nor experts interview. Based on these results, the authors found the feasibility of using social bigdata analysis for policy-mak ing. Methodological and practical implications are discussed.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121419118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study on Mobile Information Systems for Foreign Tourists based on Micro Webpages","authors":"Sang-suk Han, S. So, S. Eun","doi":"10.9716/KITS.2016.15.1.289","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.289","url":null,"abstract":"Submitted:October 27, 2015 1 st Revision:March 15, 2016 Accepted:March 17, 2016 * 이 논문은 교비연구비(2015A267)의 지원을 일부 받아 수행되었음. ** 한국폴리텍대학 대전캠퍼스 디지털콘텐츠과 교수 *** 공주대학교 컴퓨터공학부 교수 **** 한남대학교 정보통신공학과 교수, 교신저자 韓國IT서비스學會誌 第15卷 第1號 2016年 3月, pp.289-298 290 Sangsuk Han.Sun Sup So.Seongbae Eun","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomized Bagging for Bankruptcy Prediction","authors":"Sung-Hwan Min","doi":"10.9716/KITS.2016.15.1.153","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.153","url":null,"abstract":"Ensemble classification is an approach that combines individually trained classifiers in order to improve prediction accuracy over individual classifiers. Ensemble techniques have been shown to be very effective in improving the generalization ability of the classifier. But base classifiers need to be as accurate and diverse as possible in order to enhance the generalization abilities of an ensemble model. Bagging is one of the most popular ensemble methods. In bagging, the different training data subsets are randomly drawn with replacement from the original training dataset. Base classifiers are trained on the different bootstrap samples. In this study we proposed a new bagging variant ensemble model, Randomized Bagging (RBagging) for improving the standard bagging ensemble model. The proposed model was applied to the bankruptcy prediction problem using a real data set and the results were compared with those of the other models. The experimental results showed that the proposed model outperformed the standard bagging model.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132641548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Effect of the IoT Technology on SCM","authors":"Kangbae Lee, Dae-Gyun Baek, Doo-hwan Kim","doi":"10.9716/KITS.2016.15.1.227","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.227","url":null,"abstract":"In order to maximize profitability by optimizing the entire supply chain process, enterprises have made efforts to apply IT technologies such as POS, MES, and TMS. In addition, academic societies have also made efforts to verify the effects of IT technology introduction through various researches. However, until now, there is almost no research that analyzes the relationship between the IoT, a new IT technology, and the SCM. To study the effect of IoT technology on SCM, this study conducted professional Delphi surveys for three times. Through this method, this study analyzed changes that will be caused by the IoT technology, the priority area in IoT introduction, and the expected difficulty in IoT introduction on SCM. As a result of the Delphi surveys and analyses, it was expected that when IoT technology is introduced, the level of SCM’s IT use and partnership will increase. However, the effect of the increased performance of the supply chain, which includes inventory management and quality control, will become weaker. The reason is that the development of operation and management skills, as well as the improvement of IT technology, are also important elements for the performance improvement of the supply chain. As for the priority area in IoT introduction, it was expected that the effect will be greater when IoT is introduced in customer service, transportation, and delivery areas. As difficulties in IoT technology introduction, such as the shortage of IoT platform development personnel, standardization, integration with the existing system, securing professional manpower, expenses, data management, and operation, were derived, it has thus become necessary for us to exert greater efforts in order to come up with solutions.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficacy of Mobile Device Distribution Improvement Act : Long-term Contract and Cap Regulation on Breach Fee","authors":"Weonseek Kim","doi":"10.9716/KITS.2016.15.1.081","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.081","url":null,"abstract":"Submitted:October 26, 2015 1 st Revision:January 30, 2016 Accepted:February 2, 2016 * 홍익대학교 경제학부 교수 This study analyzes how breach fee under long-term contract and/or cap regulation on the breach fee can affect the impacts of “Mobile Device Distribution Improvement Act\" on handset bundle price, average revenue per unit (ARPU), and social welfare. We conduct comparative analysis with an economic model of duopoly competition in price when users are under long-term contract and the breach fee can be regulated. The results show that the Act lowers the equilibrium prices, lower than incumbent price without the Act. Price of non-dominant Mobile Network Operator (MNO) can be lower than poaching price without the Act if significant portion of switching cost is breach fee or the market is significantly asymmetric. Under the significant circumstances, the Act can raise ARPU even though it improves social welfare. By contrast, the Act increases consumer surplus without affecting social welfare if breach fee is the only source of user's switching cost and is capped by the regulation, and more symmetric market and the stronger cap leads to higher consumer surplus. Keyword:Long-Term Contract, Breach Fee, Handset Bundle Price 韓國IT서비스學會誌 第15卷 第1號 2016年 3月, pp.81-96","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malicious Users Detection and Nullifying their Effects on Cooperative Spectrum Sensing","authors":"Prakash Prasain, Dong-You Choi","doi":"10.9716/KITS.2016.15.1.167","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.1.167","url":null,"abstract":"Abstract Submitted:October 27, 2015 1 st Revision:March 20, 2016 Accepted:March 24, 2016* This study was supported by research fund from Chosun University, 2015.** Dept. of Information and Communication Engineering, Chosun Univ.*** Dept. of Information and Communication Engineering, Chosun Univ, Corresponding AuthorSpectrum sensing in cognitive radio (CR) has a great role in or der to utilize idle spectrum opportunistically, since it is responsible for making available dynamic spectrum access efficiently. In this research area, collaboration among multiple cognitive radio users has been proposed for the better ment of detection reliability. Even though cooperation among them improves the spectrum sensing performance, some fals ely reporting malicious users may degrade the performance rigorously. In this article, we have studied the de tection and nullifying the harmful effects of such malicious users by applying some well known outlier detection methods bas ed on Grubb’s test, Boxplot method and Dixon’s test in cooperative spectrum sensing. Initially, the performance of each technique is compared and found that Boxplot method outperforms both Grubb’s and Dixon’s test for the case w here multiple malicious users are present. Secondly, a new algorithm based on reputation and weight is developed to identify malicious users and cancel out their negative impact in final decision making. Simulation results demonstrate that the proposed scheme effectively identifies the malicious users and suppress their harmful effects at the fusio n center to decide whether the spectrum is idle.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114082490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Management for Cloud Marketplace : A Case of Internet2 NET+","authors":"Suhn-beom Kwon, S. Ahn","doi":"10.9716/KITS.2015.14.4.221","DOIUrl":"https://doi.org/10.9716/KITS.2015.14.4.221","url":null,"abstract":"Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122209597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on eTextbook Development for Mobile Learning in a University","authors":"Hyojung Jung, Eunhwa Chon, Eung-Kyo Suh","doi":"10.9716/KITS.2015.14.4.237","DOIUrl":"https://doi.org/10.9716/KITS.2015.14.4.237","url":null,"abstract":"Submitted:July 24, 2015 1 st Revision:November 24, 2015 Accepted:November 27, 2015 * 단국대학교 교양교육대학 교양학부 강의전담 조교수 ** 단국대학교 교양교육대학 교양학부 조교수, 교신저자 *** 단국대학교 교양교육대학 교양학부 조교수 The purpose of this study is to develop the eTextbook and to explore the usability of the eTextbook for accelerating mobile learning in university. This study was primarily based on needs analysis of students, and eTextbook was created based on digital publishing through Adobe DPS. The major design principles of the eTextbook based on previous studies were as follow. First, eTextbook should deliver learning contents in a simple and systematic way. Second, eTextbook should induce student’s flows by providing segmented learning contents and various learning resources. Third, eTextbook should expand information accessibility by providing a wide variety of multimedia functions. The development principles of eTextbook have been developed based on cognitive psychology. Location and function of the link or icon used for eTextbook have been developed on the basis of the principles of cognitive psychology. The main development principles were Coherence, Signaling, Redundancy, Segmentation, Multimedia principle, and so on. In order to examine usability of the developed eTextbook, experts’ and learners’ reactions were evaluated. The primary responses of learners are that the eTextbook increased the learning accessibility and provided various multimedia factors, and thus increased the learning flows in the class. Keyword:Mobile Learning, eTextbook, Ebook, Design Principles, Cognitive Psychology 韓國IT서비스學會誌 第14卷 第4號 2015年 12月, pp.237-256 238 Hyojung Jung.Eunhwa Chon.Eung-Kyo Suh","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}