Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

2020 KCI Impact Factor : 0.4
Home > Explore Content > All Issues > Article List

2010, Vol.15, No.12

  • 1.

    Development of Parallel Event-Driven Remote IT Convergence

    Jung-Sook, Kim | Sungoan Kim | HongSop Kim | 2010, 15(12) | pp.1~9 | number of Cited : 0
    Abstract PDF
    This paper describes parallel event-driven remote IT convergence applications which are a combination of traditional industry and IT Technology including advanced communication. In IT convergence system, events can occur currently from many sensors of devices or users. And IT convergence system must have a parallel processing method. In this paper, the parallel processing method was implemented using a thread and we developed a connection method between a device and a mode of communication which is a wireless communication or a power line communication. In addition to that, we developed object modeling, device, user and event modeling, based on XML (eXtensible Markup Language) using object-oriented modeling method. To efficiently show results in real time, systems provide various graphic user interfaces such as a bar graph, a table, and a combination of the two.
  • 2.

    A research on non-interactive multi agents by ACS & Direction vector algorithm

    김현 | Seokhyun Yoon | Tae-Choong Chung | 2010, 15(12) | pp.11~18 | number of Cited : 0
    Abstract PDF
    In this paper, We suggest new strategies on non-interactive agents applied in a prey pursuit problem of multi agent research. The structure of the prey pursuit problem by grid space(Four agent & one prey). That is allied agents captured over one prey. That problem has long been known in interactive, non-interactive of multi agent research. We trying hard to find its own solution from non-interactive agent method on not in the same original environment(circular environment). We used ACS applied Direction vector to learning and decide on a direction. Exchange of information between agents have been previously presented (an interactive agent) out of the way information exchange ratio (non-interactive agents), applied the new method. Can also solve the problem was to find a solution. This is quite distinct from the other existing multi agent studies, that doesn't apply interactive agents but independent agent to find a solution.
  • 3.

    A Study of Biosignal Analysis System for Sensibility Evaluation

    이지형 | KIM Kyungho | 2010, 15(12) | pp.19~26 | number of Cited : 4
    Abstract PDF
    In this paper, we studied about the Embedded System of the biosignal measurement and analysis to sensibility evaluation in daily life for non-intrusive. This system is two kinds of measuring biosiganls( Electrocardiogram:ECG , Photoplethysmography:PPG) and analyzed by real-time wireless transmission to notebook PC using bluetooth for consistent and reliability of physiological way to assess continuously changing sensibility. Comparative studied of an autonomic nerve system activity ratio on characteristics frequency band of two kinds of biosignal analyzed frequency way using the Fast Fourier Transform(FFT) and Power Spectrum Density(PSD). Also the key idea of this system is to minimize computing of analysis algorithm for faster and more accurate to assess the sensibility, and the result of the visualization using graph. In this paper, we evaluated the analysis system to assess sensibility that measuring various situation in daily life using a non-intrusive biosignal measurement system, and the accuracy and reliability in comparison with difference of result by development analysis system
  • 4.

    Adult Image Detection Using Skin Color and Multiple Features

    Jang Seok-Woo | HYUNG IL CHOI | Gyeyoung Kim | 2010, 15(12) | pp.27~35 | number of Cited : 2
    Abstract PDF
    Extracting skin color is significant in adult image detection. However, conventional methods still have essential problems in extracting skin color. That is, colors of human skins are basically not the same because of individual skin difference or difference races. Moreover, skin regions of images may not have identical color due to makeup, different cameras used, etc. Therefore, most of the existing methods use predefined skin color models. To resolve these problems, in this paper, we propose a new adult image detection method that robustly segments skin areas with an input image-adapted skin color distribution model, and verifies if the segmented skin regions contain naked bodies by fusing several representative features through a neural network scheme. Experimental results show that our method outperforms others through various experiments. We expect that the suggested method will be useful in many applications such as face detection and objectionable image filtering.
  • 5.

    Contrast Improvement Technique Using Variable Stretching based on Densities of Brightness

    이명윤 | Youngjun Han | Hernsoo Hahn | 2010, 15(12) | pp.37~45 | number of Cited : 3
    Abstract PDF
    This paper proposes a novel contrast enhancement method which determines the stretching ranges based on the distribution densities of segmented sub-histogram. In order to enhance the quality of image effectively, the contrast histogram is segmented into sub-histograms based on the density in each brightness region. Then the stretching range of each sub-histogram is determined by analysing its distribution density. The higher density region is extended wider than lower density region in the histogram. This method solves the over stretching problem, because it stretches using density rate of each area on the histogram. To evaluate the performance of the proposed algorithm, the experiments have been carried out on complex contrast images, and its superiority has been confirmed by comparing with the conventional methods.
  • 6.

    Implementation of Educational Game to Accompany Exercising and Generating

    이경호 | 2010, 15(12) | pp.47~55 | number of Cited : 1
    Abstract PDF
    In this paper, we implemented a serious game system for study to accompany exercising and generating to keep on computer game side effect. The implemented serious game system was divided into the game part and the athletic part. The athletic part for whole body exercising was composed of health bicycle for lower body exercise and additional apparatus for upper body exercise, that was attached to the rear side of health bicycle and several generator was attached to the power point of athletic part. The circuit board and logic program was composed to adjust the exercise strength control, to get data and to communicate with the computer. The game part was composed to promote and educational effectiveness, the whole system emphasized on amusement side while avoided violence side. We confirmed the effect of the serious game system with the fourteen fun form which Garneau insists.
  • 7.

    Reliability Constrained Resource Allocation in Cellular Network Uplink Scheduler

    이성원 | 정광렬 | 박애순 | 2010, 15(12) | pp.57~66 | number of Cited : 2
    Abstract PDF
    In this paper, we propose the reliability constrained resource allocation scheduling algorithm in cellular network for uplink transmission, where uplink transmission is supported via packet switching schemes without the dedicated uplink circuit links. We evaluate the performance of the proposed algorithm, and compared with the conventional works to identify the pros and cons. The proposed uplink scheduling algorithm is to satisfy the constraints requirements of the MTC services which is considered as the core technology for future mobile wireless networks. It is different to conventional works which target to maximize the link capacity. The proposed algorithm provides reliable uplink transmission independent to the location and the quality of the wireless link of the mobile terminal. Based on the performance evaluation results, we conclude that the proposed method provides enhanced reliability performance than conventional works.
  • 8.

    A New Presence Lists Service in SIP Environment

    Jang,Choon-Seo | 2010, 15(12) | pp.67~73 | number of Cited : 2
    Abstract PDF
    In SIP(Session Initiation Protocol) environment, the presence event notification operation makes presence service user to recognize presence information status changes of the other party. In conventional method, the user should send each SIP SUBSCRIBE message containing the address of the other party to the presence server. Furthermore each presence subscription requires refresh messages, and the amount of notification messages from the other party becomes large. These facts increases network traffic and the load of presence server. In this paper, to solve these problems a new presence list service has been suggested. It uses a presence list consists of URI of the other party and make it possible to subscribe by using one SUBSCRIBE message. So this method decreases the amount of SUBSCRIBE messages and refresh messages, and it also decreases the amount processing event notification messages from the subscribed the other party. And to increase the efficiency, a presence filtering method which enables to include some parts of selected presence information into the notification message body has been also suggested. The implemented system can reduce SIP message related network traffic and message processing time of the presence server. The performance of this proposed system has been evaluated by experiments ,and the results showed decreasing of server processing time.
  • 9.

    Distance Ratio based Probabilistic Broadcasting Mechanism in Mobile Ad Hoc Network

    김재수 | Kim Jeong Hong | 2010, 15(12) | pp.75~84 | number of Cited : 5
    Abstract PDF
    As broadcasting in Mobile Ad hoc NETwork (MANET) is the process that a node sends a packet to all other nodes in the network. it is used for routing protocols such as Ad hoc On demand Distance Vector (AODV) to disseminate control information for establishing the routes. In this paper, we propose Probabilistic Broadcasting mechanism based on Distance Ratio between sender and receive node in MANETs. The proposed approach is based on the combination of probability and distance based approach. A mobile node receiving broadcast packets determines the probability of rebroadcasting considering distance ratio from sender. The distance ratio of a node is calculated by the distance from sender and the length of radio field strength. As a node with high distance ratio is located far away from sender, rebroadcast probability is set to high value. On contrary, the low rebroadcast probability is set for a node with low distance ratio which is close to sender. So it reduces packets transmission caused by the early die-out of rebroadcast packets. Compared with the simple flooding and fixed probabilistic flooding by simulation, our approach shows better performances results. Proposed algorithm can reduce the rebroadcast packet delivery more than 30% without scanting reachability, where as it shows up to 96% reachability compared with flooding.
  • 10.

    Video Conferencing Authentication : A Key Management Protocol Design for safety

    정용득 | 2010, 15(12) | pp.85~92 | number of Cited : 1
    Abstract PDF
    There is an authentication method for participants with an encrypted ID and password as a symmetric-key in multilateral video conferencing. It is hard to manage when the security-keys makes many while the transportation processing for the encryption and decryption get complicated when the video conferencing involves a number of participants and the third party as an attackers to gain unauthorized symmetric-key to access video conference which makes a problem less secrecy. This study suggests three ways to enhance security in video conference: first, we present PKI-based X.509 certificate for authenticating the participants of multilateral conferencing and we suggest to encode and decode the video conference media data using a secrecy key created by each of the conference participants; second, a more secured multilateral video conferencing can be expected in a group communication by using the participants secrecy key in creating and distributing group keys, where the group key will be renewed whenever there is change in the group member; and finally, we suggest to encode the RTP payload of the media data before transmission.
  • 11.

    Fast Prefix Deletion for Parallel TCAM-Based IP Address Lookup

    Jinsoo Kim | Junghwan Kim | 2010, 15(12) | pp.93~100 | number of Cited : 2
    Abstract PDF
    In this paper, we propose a technique which makes it faster to delete prefixes in an IP address lookup architecture based on parallel TCAMs. In previous deletion schemes, more than one memory movement is needed for the prefix ordering and keeping the available memory space consecutive. For deletion, our scheme stores the address of the deleted prefix in a stack implemented by SRAM instead of actual movement in TCAM. Since SRAM has very short latency compared to TCAM, the proposed scheme can accomplish fast updating. From the experiment with the real forwarding table and update trace, we evaluate the performance of our scheme in terms of the memory access time for the prefix insertion and deletion. The experiment result also shows good performance with considerably small size of stack.
  • 12.

    A Study on the Relevance Improvement of Enterprise Search using Tag Information

    손태식 | ParkByoungSeob | Hyohyun Choi | 2010, 15(12) | pp.101~108 | number of Cited : 0
    Abstract PDF
    In this paper, how fast and accurate the companies provides exponentially increasing information to the users is the most important in the corporate competitiveness. The enhancement of the retrieval relevance became the important element in enhancing company competitiveness and it is required to provide the services that are beyond simple retrieval service for good quality search service. This paper proposes the effective scheme that enhances retrieval relevance by utilizing registered tag information. By proposed scheme, we can overcome the limitations of retrieval relevance that usual search engines provide. And we compare the proposed scheme with existing web retrieval service on retrieval relevance evaluation and related search keyword.
  • 13.

    An Efficient User Authentication Protocol using Smartcard

    slyong | 조태남 | 2010, 15(12) | pp.109~116 | number of Cited : 0
    Abstract PDF
    Due to the increasing interest and demands of user privacy, remote user authentication schemes using smart card has been researched in active. Recently, a lot of suggestion have been made in order to provide user's anonymity and trace a malicious user. In 2008, Kim et al. proposed a traceable anonymity authentication scheme. In 2009, Choi et al. pointed out that Kim's protocol was insecure against outsider attacker and proposed an improved scheme. But Kim's and Choi's schemes fail to provide the user's anonymity or compute some values in the protocol. In this paper, we analyse those problems and suggest two improved schemes to resolve those problems.
  • 14.

    Design of Interoperable DRM System in Home Domain

    문주영 | 2010, 15(12) | pp.117~123 | number of Cited : 0
    Abstract PDF
    In this paper, we proposed the interoperable DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. We tried to solve the problem about contents redistribution between devices under different DRM regime so that we suggested a interoperable DRM system that allow end users to redistribute contents within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. In order that end users can use freely their contents using home digital device without additional payment, we must build a home domain for interoperable DRM system for contents redistribution among devices. If both of exporting device and importing device are authenticated in home domain by HADM(Home Authorized Domain Manager), then the exporting device can redistribute packaged contents under importing DRM regime to the importing device by DIM(DRM Interoperability Manager).
  • 15.

    In Out-of Vocabulary Rejection Algorithm by Measure of Normalized improvement using Optimization of Gaussian Model Confidence

    안찬식 | OH, SANG YEOB | 2010, 15(12) | pp.125~132 | number of Cited : 2
    Abstract PDF
    In vocabulary recognition has unseen tri-phone appeared when recognition training. This system has not been created beginning estimation figure of model parameter. It's bad points could not be created that model for phoneme data. Therefore it's could not be secured accuracy of Gaussian model. To improve suggested Gaussian model to optimized method of model parameter using probability distribution. To improved of confidence that Gaussian model to optimized of probability distribution to offer by accuracy and to support searching of phoneme data. This paper suggested system performance comparison as a result of recognition improve represent 1.7% by out-of vocabulary rejection algorithm using normalization confidence.
  • 16.

    Design of the Integrated Fire Automation System(IFAS) on based P-Type Fire Control Panel

    HyunJu Kim | PARK JAE HEUNG | Yeong-Geon Seo | 2010, 15(12) | pp.133~142 | number of Cited : 1
    Abstract PDF
    P-type fire control panel, currently in use, has a big hazard that can cause the large scaled human death tolls and property damage in the massive fire because it is difficult to identify in real time the location of fire outbreak and whether search-device are broken down or not. In this paper, I suggest that the integrated fire automation system on based p-type fire control panel should be used, which can detect in real time the signal that occur when whether search-device are broken down or not, and can detect the arisen circumstances information of p-type fire control panel on the fire signal in the far away. The devised systems have designed and embodied the analysis of circumstances information and module that can analyze the circumstances information from the p-type fire control panel and the part of internet access installment which can gather and deliver the circumstances information from the fire prevention facility receiver.
  • 17.

    BPEL Based Service Oriented Business Process Modeling

    lee sang young | 2010, 15(12) | pp.143~150 | number of Cited : 2
    Abstract PDF
    To survive in rapidly changing business environment, the enterprise should adapt its business process to the changing environment. The system integration is an important issue to tackle this challenge. It is unavoidable direction that SOA(Service Oriented Architecture) is accepted as an upcoming IT standard to support flexible business processes and integration. In particular, the integration of business processes and interfaces are important. Therefore, intuitive and easy to implement business process modeling is required. In this paper analyzes business process between enterprises, modeling the service-oriented business process with BPEL to realization level. Also, In this paper suggests that UML is used from high-level business problems to the process of low-level problem for Visual and effectively.
  • 18.

    A Design and Implementation of EPCIS Repository for RFID and Sensor Data

    현승렬 | Lee Sang Jeong | 2010, 15(12) | pp.151~162 | number of Cited : 2
    Abstract PDF
    In order to build up the ubiquitous computer environment, there are many researches on automatic identification, sensor networks, and home networks etc. EPCIS (EPC Information Services), which is proposed by EPCglobal, is a standard on the repository managing tag data that is needed to develop RFID application system. In this paper, the EPCIS repository is designed and implemented. It is able to search the object dependent upon general object recognition and environment information variation. And sensor data, which is also massive data and is changed with position, is integrated into RFID data in the system. By doing so, it is possible to do the convergence managements of object recognition with variations of USN (Ubiquitous Sensor Network) environment.
  • 19.

    Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience

    Haejung Yun | 장재빈 | Choong Cheang Lee | 2010, 15(12) | pp.163~173 | number of Cited : 5
    Abstract PDF
    PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.
  • 20.

    Ultra-High Frequency Characteristics of Double-Wall Carbon Nanotube Resonator with Different Length

    김진태 | Lee Jun Ha | KangHo-Lee and 1other persons | 2010, 15(12) | pp.175~180 | number of Cited : 0
    Abstract PDF
    In this paper, we have investigated ultrahigh frequency nano-mechanical resonators, made of DWCNTs with various wall lengths, via classical molecular dynamics simulations. We have aimed our analysis on the frequency variations of these resonators with the DWCNT wall lengths. The results show that the variations can be well fitted by either the Pearson VII function when the resonant frequency of normalized by its maximum frequency is plotted as a function of the inner/outer wall length ratio L5/L10 for different values of the outer wall length L10, and the Gauss distribution function when the resonant frequency of normalized by its maximum frequency is plotted as a function of the outer/inner wall length ratio for different values of the inner wall length.
  • 21.

    3D Visualization for Flight Situational Awareness using Google Earth

    박석규 | 박명철 | 2010, 15(12) | pp.181~188 | number of Cited : 3
    Abstract PDF
    This paper proposes 3D visualization systems for the real-time situation awareness and a state information of the aircraft. This system was embodied with OpenGL and the Google Earth of web base using situation data of the aircraft. The existing system has problem which speed decrease and visible restricted map because massive data of terrain and satellite photo. This system is supports the visualization tool which is economic and entire area for a real-time situation awareness with minimum flight information using Open-API of the Google Earth. Also provides a visible convenience to expansion-view using multiple location information. This research result could be used to system for the situation awareness of the aircraft from web environment.
  • 22.

    A Decomposition Method for TMMi Maturity Level 1 using Process Area Dependency Analysis

    김선준 | RHEW SUNG YUL | 오기성 | 2010, 15(12) | pp.189~196 | number of Cited : 0
    Abstract PDF
    Domestic software test maturity level is the most Level 2 below based on TMMi. The first condition of enhancement of test maturity is that know exactly what the current maturity. There is no Level 1 definition in TMMi, but even the same level of maturity level of an organization, there are clear differences. In this study, grasp a maturity level of Level 1 organization, while less effort to improve in Level organization, the ways to achieve Level 2 is presented. Sub practices with dependencies in Level 2 is grouped with the corresponding process areas and define a Level 1 newly at 3 phases. If sub practices with dependencies are tied and improve a process, it will produce the effect which attains the practices all at once. Verify the adequacy of three phases, as a result, an organization clearly identify Test Maturity Level 1, we know that the organization can set specific improvement goals and direction.
  • 23.

    Class prediction of an independent sample using a set of gene modules consisting of gene-pairs which were condition(Tumor, Normal) specific.

    정현이 | Youngmi Yoon | 2010, 15(12) | pp.197~207 | number of Cited : 2
    Abstract PDF
    Using a variety of data-mining methods on high-throughput cDNA microarray data, the level of gene expression in two different tissues can be compared, and DEG(Differentially Expressed Gene) genes in between normal cell and tumor cell can be detected. Diagnosis can be made with these genes, and also treatment strategy can be determined according to the cancer stages. Existing cancer classification methods using machine learning select the marker genes which are differential expressed in normal and tumor samples, and build a classifier using those marker genes. However, in addition to the differences in gene expression levels, the difference in gene-gene correlations between two conditions could be a good marker in disease diagnosis. In this study, we identify gene pairs with a big correlation difference in two sets of samples, build gene classification modules using these gene pairs. This cancer classification method using gene modules achieves higher accuracy than current methods. The implementing clinical kit can be considered since the number of genes in classification module is small. For future study, Authors plan to identify novel cancer-related genes with functionality analysis on the genes in a classification module through GO(Gene Ontology) enrichment validation, and to extend the classification module into gene regulatory networks.
  • 24.

    Real Time Temperature Monitoring System Using Optic Fiber Sensor

    이창근 | 김영수 | 구명모 and 1other persons | 2010, 15(12) | pp.209~216 | number of Cited : 1
    Abstract PDF
    Optical Temperature Distribution Sensor Measurement System uses fiber optic sensors itself for temperature measurement is a system which can be measured the Installed surrounding entire temperature as a thousand points by laying a single strand of fiber optic. If there are a lot of measuring points in the distribution Measurement, the cost of each measuring point can be reduced the cost level of existing sensors and at the same time this has the advantage of connecting all sensors as one or two strands of fiber. Generally Optical Fiber is used for communication but Optical Fiber itself can be used for sensor and it has the characteristic of sensor function which can be measured Temperature in the at least each one meter distance. By using these characteristics each sensor and the number of Connection Lines can be reduced. In this paper, we implement a real time temperature monitoring system, which is easy to manage and control for data storage, data management, data storage using a computer and which has the functions of monitoring and correction according to Real-time temperature changes using historical temperature data.
  • 25.

    A System Architecture Design for Web-Based Application Systems using Role-Based Access Control

    Ho Lee | 2010, 15(12) | pp.217~225 | number of Cited : 0
    Abstract PDF
    Among web-based systems being widely used now, there are so many systems which are still using an user-level access control method. By successfully applying role-based access control(RBAC) to web-based application systems, we can expect to have an effective means with reinforced security for Internet-based systems. In order to apply RBAC to web-based application systems, we should come up with a system architecture for it. I proposed a system architecture which is needed to apply RBAC to web-based application systems. The proposed system architecture is largely composed of system composition and system functioning. For details, firstly, a certificate used by RBAC is specified. Secondly, a system architecture using a user-pull method is proposed and overall system components are mentioned with a role server being centered. Then, I showed how the system architecture can work to carry out RBAC on web-based application systems. Lastly, the analyses on the proposed system architecture are described for the purpose of proving its feasibility.
  • 26.

    Personalized e-Commerce Recommendation System using RFM method and Association Rules

    진병운 | 조영성 | 류근호 | 2010, 15(12) | pp.227~235 | number of Cited : 17
    Abstract PDF
    This paper proposes the recommendation system which is advanced using RFM method and Association Rules in e-Commerce. Using a implicit method which is not used user's profile for rating, it is necessary for user to keep the RFM score and Association Rules about users and items based on the whole purchased data in order to recommend the items. This proposing system is possible to advance recommendation system using RFM method and Association Rules for cross-selling, and also this system can avoid the duplicated recommendation by the cross comparison with having recommended items before. And also, it's efficient for them to build the strategy for marketing and crm(customer relationship management). It can be improved and evaluated according to the criteria of logicality through the experiment with dataset collected in a cosmetic cyber shopping mall. Finally, it is able to realize the personalized recommendation system for one to one web marketing in e-Commerce.
  • 27.

    Predicting IT-based Robot Adoption in Korea: By Integrating TAM and EDT

    Yoojung Kim | Jongsoo Yoon | Lee, Hyung-seok | 2010, 15(12) | pp.237~245 | number of Cited : 1
    Abstract PDF
    Korea Communications Commission (KCC) has been providing the pilot service of URC(Ubiquitous Robot Companion), which is a network-based personal robot, to 1000 Korean households since 2006 to define potential users’ needs and adoption behaviors. Personal innovativeness might play a critical role in adoption of URC services by users because much sophisticated and convergence technologies are incorporated into URC services. Also, defining not only perceived beliefs about URC services but also expected beliefs about them are very crucial to reduce disconfirmation between users’ perception and expectation of URC services. From this point of view, this paper aimed to examine robot users’ adoption behavior by considering constructs such as personal innovativeness, usefulness (perceived usefulness - expected usefulness, P-E), user attitude, and intention to use. The findings reveal that personal innovativeness is negatively related to usefulness (P-E) whereas usefulness (P-E) influences significantly and positively on user attitude. It is also shown that usefulness (P-E) and user attitude have strong positive effects on intention to use.
  • 28.

    A Research on the Digital Information of the Deceased

    Young Hwan Kim | 2010, 15(12) | pp.247~253 | number of Cited : 0
    Abstract PDF
    The demand that needs 'Digital Legacy', a notion that an Internet user can transfer his private blogs, e-mail and financial assets to inheritors and party interested when he died suddenly in the accident, has been growing recently. This issue has become a social hot potato since Justine Ellsworth's father in USA sued Yahoo for the right to access his son's Yahoo e-mail account after Justine Ellsworth had died in Iraq, in November, 2004 and the problems happened to deal with suicide-related blogs and homepages when great entertainers in Korea committed suicide and soldiers' parents in the situation of warship Chonan tragedy in Korea demanded access to soldiers' homepages and e-mail accounts. The point at issue focuses on the property matters about the digital information of the deceased and the relationship between the deceased and the Internet Service Provider(ISP). This research looks into the trend of judicial precedents and laws related to the digital information of the deceased and suggests the preliminary data of the next research.
  • 29.

    An Analysis for Influence Factors of ITA Introduction and IT Governance -Towards Public& Private Organization-

    Kyungwoo Kim | 2010, 15(12) | pp.255~263 | number of Cited : 1
    Abstract PDF
    In this paper, I derived some function factors from ITA role in organization as to analyze what ITA function has influenced on ITA governance. The factors of IT governance system and their effects on the their organizations are discussed and the relationships are verified by empirical model. In result of statistical analysis based on the 223 case of organizations, it appeared that IT infrastructure , I T technology system and IT performance system of IT functions are the contributing factors on the IT Governance. The main analysis results described significantly are shows as follows. Through the introduction of ITA which has improved technology system support and performance system level, it is effected by the ITA Governance system building.. In special, focusing on IT infrastructure systemization., IT service level is expected to improve of the IT Governance sphere, This study is intended to propose how to improve information management efficiency through ITA.