This page has only limited features, please log in for full access.

Prof. Hangbae Chang
Chung-Ang University

Basic Info


Research Keywords & Expertise

0 Security Analysis
0 Security Design
0 Security Intelligence
0 Security Management
0 Security Economics

Fingerprints

Security Management
Security Design

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 11 January 2021 in Security Journal
Reads 0
Downloads 0
ACS Style

Sangho Park; Harang Yu; Hangbae Chang. Design of the required tasks of industrial security experts based on job openings. Security Journal 2021, 1 -28.

AMA Style

Sangho Park, Harang Yu, Hangbae Chang. Design of the required tasks of industrial security experts based on job openings. Security Journal. 2021; ():1-28.

Chicago/Turabian Style

Sangho Park; Harang Yu; Hangbae Chang. 2021. "Design of the required tasks of industrial security experts based on job openings." Security Journal , no. : 1-28.

Journal article
Published: 01 January 2021 in Computers, Materials & Continua
Reads 0
Downloads 0
ACS Style

Gi-Wan Hong; Jeong-Wook Kim; Hangbae Chang. Blockchain Technology Based Information Classification Management Service. Computers, Materials & Continua 2021, 67, 1489 -1501.

AMA Style

Gi-Wan Hong, Jeong-Wook Kim, Hangbae Chang. Blockchain Technology Based Information Classification Management Service. Computers, Materials & Continua. 2021; 67 (2):1489-1501.

Chicago/Turabian Style

Gi-Wan Hong; Jeong-Wook Kim; Hangbae Chang. 2021. "Blockchain Technology Based Information Classification Management Service." Computers, Materials & Continua 67, no. 2: 1489-1501.

Journal article
Published: 19 December 2020 in Sustainability
Reads 0
Downloads 0

This research establishes a security evaluation model from the insider leakage perspective and suggests an objective evaluation measurement. Organizational security risks are fused and compounded both inside and outside the organization. Although multiple security controls are implemented to minimize an organization’s security risk, effective security control requires management to preemptively check the organization’s security level. Existing criteria for evaluating security level are limited to external security risks and have improper limit points for dealing with security risks that are fused and compounded within an organization. The focus of this study is the prevention of technical information leakage. Furthermore, we propose a method for measuring the level at which the objectivity of certain items is secured. We compiled 26 detailed evaluation items, considering the security requirements to prevent technical information leakage. We not only performed suitability, reliability, and factor analyses and statistical validation, but also established a method to measure the security level. This measurement method ensures the effectiveness and objectivity of the evaluation of security level, mitigating the risks of security incidents caused by insiders. The results serve as a reference for organizations when designing security evaluation criteria and automated tools based on our evaluation model for future research.

ACS Style

Jawon Kim; Chanwoo Lee; Hangbae Chang. The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth. Sustainability 2020, 12, 10639 .

AMA Style

Jawon Kim, Chanwoo Lee, Hangbae Chang. The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth. Sustainability. 2020; 12 (24):10639.

Chicago/Turabian Style

Jawon Kim; Chanwoo Lee; Hangbae Chang. 2020. "The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth." Sustainability 12, no. 24: 10639.

Conference paper
Published: 17 December 2020 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

With the spread of the Internet and increasing amounts of self-proclaimed journalists, articles both true and inaccurate fill the web. These inaccurate articles, most commonly referred to as fake news, have proved to spread quickly and have immense social influence in society. Attempts to detect fake news articles through deep learning techniques and artificial intelligence prove the challenges in fake news detection. While detection techniques are still in development, there is not much research on how readers can discern fake news without technological aid. This paper addresses such limitations regarding the study of fake news detection and provide a detection model for readers. The model is based on logical steps built on detection cues mentioned in previous works. The appropriateness of the detection cues will be determined based on case studies.

ACS Style

Lee Won Park; Hangbae Chang. Analysis Design Study for Fake News Identification and Evaluation. Lecture Notes in Electrical Engineering 2020, 181 -186.

AMA Style

Lee Won Park, Hangbae Chang. Analysis Design Study for Fake News Identification and Evaluation. Lecture Notes in Electrical Engineering. 2020; ():181-186.

Chicago/Turabian Style

Lee Won Park; Hangbae Chang. 2020. "Analysis Design Study for Fake News Identification and Evaluation." Lecture Notes in Electrical Engineering , no. : 181-186.

Review
Published: 16 November 2020 in Sustainability
Reads 0
Downloads 0

As the world enters a fourth Industrial Revolution, organizations worldwide face challenges in dealing with important assets such as industrial technology. Leaking these assets can not only damage organizations economically but also negatively affect customer relationships and brand image. This has led to an increased awareness of industrial security in both the business and academic spheres and a focus on identifying and implementing countermeasures against security incidents, as future computing environments will continuously face security threats. This study first examines the literature on industrial security and its current status in South Korea, which is considered an active industrial security research environment. Subsequently, meta-analyses are conducted on South Korea and abroad to compare their status and research trends in the industrial security field. The results confirm that South Korea has more actively conducted relevant studies compared to international research. This study contributes to the current literature by not only increasing the awareness of industrial security but also encouraging future studies in the field to facilitate a safe and sustainable computing environment.

ACS Style

Harang Yu; Hangbae Chang. A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth. Sustainability 2020, 12, 9526 .

AMA Style

Harang Yu, Hangbae Chang. A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth. Sustainability. 2020; 12 (22):9526.

Chicago/Turabian Style

Harang Yu; Hangbae Chang. 2020. "A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth." Sustainability 12, no. 22: 9526.

Journal article
Published: 29 September 2020 in Sustainable Cities and Society
Reads 0
Downloads 0

An urban local body of our country has planned to establish innovative and affordable method of treating solid waste offsite. Current manual waste segregation method is still a challenge for the environmental sustainability and considering the fact a mechanical waste segregator is designed which can identify the type of waste and separate them using Arduino microcontroller. The separated solid wastes are subjected to landfill and a review on landfill leachate management practice is presented in this paper. Then an enhanced Sequential Leach Bed–HUASB Reactor design is proposed for leachate treatment. The fabricated pilot scale model was functioning in the mesophilic state with pretreated solid waste as feed for ten different organic loading. The routine and real time monitoring of process control is based on plasma that depends on remote and onsite control. The materialization of devices is based on the Internet of Things (IoT) cloud, which is observed to be the emerging trend. By captivating the field data the devices are related to the process of mathematical calculation that plays significant role in transforming to the objects and are used to scrutinize turbidity, suspended solids, dissolved oxygen and COD using sensors, thereby managing the leachate for making Sustainable smart city development.

ACS Style

S. Gopikumar; S. Raja; Y. Harold Robinson; Vimal Shanmuganathan; Hangbae Chang; Seungmin Rho. A method of landfill leachate management using internet of things for sustainable smart city development. Sustainable Cities and Society 2020, 66, 102521 .

AMA Style

S. Gopikumar, S. Raja, Y. Harold Robinson, Vimal Shanmuganathan, Hangbae Chang, Seungmin Rho. A method of landfill leachate management using internet of things for sustainable smart city development. Sustainable Cities and Society. 2020; 66 ():102521.

Chicago/Turabian Style

S. Gopikumar; S. Raja; Y. Harold Robinson; Vimal Shanmuganathan; Hangbae Chang; Seungmin Rho. 2020. "A method of landfill leachate management using internet of things for sustainable smart city development." Sustainable Cities and Society 66, no. : 102521.

Journal article
Published: 02 August 2020 in Sustainability
Reads 0
Downloads 0

With the continuously increasing number of data leakage security incidents caused by organization insiders, current security activities cannot predict a data leakage. Because such security incidents are extremely harmful and difficult to detect, predicting security incidents would be the most effective preventative method. However, current insider security controls and systems detect and identify unusual behaviors to prevent security incidents but produce many false-positives. To solve these problems, the present study collects and analyzes data leaks by insiders in advance, analyzes information leaks that can predict security incidents, and evaluates risk based on behavior. To this end, data leakage behaviors by insiders are analyzed through an analysis of previous studies and the implementation of an in-depth interview method. Statistical verification of the analyzed data leakage behavior is performed to determine the validity and derive the levels of leakage risk for each behavior. In addition, by applying the N-gram analysis method to derive a data leakage scenario, the levels of risk are clarified to reduce false-positives and over detection (i.e., the limitations of existing data leakage prevention systems) and make preemptive security activities possible.

ACS Style

Jawon Kim; Jaesoo Kim; Hangbae Chang. Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organization. Sustainability 2020, 12, 6217 .

AMA Style

Jawon Kim, Jaesoo Kim, Hangbae Chang. Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organization. Sustainability. 2020; 12 (15):6217.

Chicago/Turabian Style

Jawon Kim; Jaesoo Kim; Hangbae Chang. 2020. "Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organization." Sustainability 12, no. 15: 6217.

Journal article
Published: 22 February 2019 in Security Journal
Reads 0
Downloads 0

Industrial technology outflow incidents negatively affect corporations, the industry, and countries. Yet, corporate information security is weak, and there is low awareness of the issue’s seriousness. This study developed a rating model that can distinguish “importance” based on an objective standard. Fourteen components that can evaluate the importance of corporate information were derived from the related literature and verified for validity and reliability using factor analysis to organize final rating factors, such as Cost of Information Creation, Level of Information, Information Utilization, Effect of Internal Utilization, and Risk of External Leakage. A secondary survey targeted field experts to set the relative weights between five rating factors and give the relative weights for Effect of Internal Utilization Risk of External Leakage. A corporate information classification system was then designed to grades importance using the five factors. A final rating model of corporate information is suggested by defining security activity by level, granted by grade. This model is designed for corporate use and is expected to benefit economic security activity.

ACS Style

Onechul Na; Lee Won Park; Harang Yu; Yanghoon Kim; Hangbae Chang. The rating model of corporate information for economic security activities. Security Journal 2019, 32, 435 -456.

AMA Style

Onechul Na, Lee Won Park, Harang Yu, Yanghoon Kim, Hangbae Chang. The rating model of corporate information for economic security activities. Security Journal. 2019; 32 (4):435-456.

Chicago/Turabian Style

Onechul Na; Lee Won Park; Harang Yu; Yanghoon Kim; Hangbae Chang. 2019. "The rating model of corporate information for economic security activities." Security Journal 32, no. 4: 435-456.

Journal article
Published: 13 November 2018 in Applied Sciences
Reads 0
Downloads 0

Recently, fire accidents in buildings have become bigger around the world, and it has become necessary to build an efficient building disaster management system suitable for fires in a Smart City. As building fires increase the number of casualties and property damage, it is necessary to take appropriate action accordingly. There has been an increasing effort to develop such disaster management systems worldwide by applying information communication technology (ICT), and many studies have been conducted in practice. In this paper, an augmented reality (AR)-based Smart Building and Town Disaster Management System is suggested in order to acquire visibility and to grasp occupants in case of fire disasters in buildings. This system provides visualization information and optimal guide for quick initial response by utilizing smart element AR-based disaster management service through linkage of physical virtual domain in the building. Additionally, we show a scenario flow chart of the fire extinguishment process according to the time from the ignition stage to the extinguishment stage in the building. Finally, we introduce the related sensors, the actuators, and a small test-bed for AR-based disaster management service. This test-bed was designed for interlocking and interoperability test of the system between the sensors and the actuators. It is expected that the proposed system can provide a quick and safe rescue guideline to the occupants and rescuers in the building where fire is generated and in regions of poor visibility.

ACS Style

Sangmin Park; Soung Hoan Park; Lee Won Park; Sanguk Park; Sanghoon Lee; Tacklim Lee; Sang Hyeon Lee; Hyeonwoo Jang; Seung Min Kim; Hangbae Chang; Sehyun Park. Design and Implementation of a Smart IoT Based Building and Town Disaster Management System in Smart City Infrastructure. Applied Sciences 2018, 8, 2239 .

AMA Style

Sangmin Park, Soung Hoan Park, Lee Won Park, Sanguk Park, Sanghoon Lee, Tacklim Lee, Sang Hyeon Lee, Hyeonwoo Jang, Seung Min Kim, Hangbae Chang, Sehyun Park. Design and Implementation of a Smart IoT Based Building and Town Disaster Management System in Smart City Infrastructure. Applied Sciences. 2018; 8 (11):2239.

Chicago/Turabian Style

Sangmin Park; Soung Hoan Park; Lee Won Park; Sanguk Park; Sanghoon Lee; Tacklim Lee; Sang Hyeon Lee; Hyeonwoo Jang; Seung Min Kim; Hangbae Chang; Sehyun Park. 2018. "Design and Implementation of a Smart IoT Based Building and Town Disaster Management System in Smart City Infrastructure." Applied Sciences 8, no. 11: 2239.

Journal article
Published: 01 May 2018 in Discrete Applied Mathematics
Reads 0
Downloads 0

The information communication technology (ICT) outsourcing market is growing larger every year from the increasing number of companies that utilize ICT outsourcing, as industry scale increases and industrial specialization intensifies. However, the current circumstance is that security accidents related to ICT outsourcing are continuously occurring at an increasing scale. There is a lack of studies measuring the level of security management of organizational ICT outsourcing, which is the first step in performing security management of ICT outsourcing. In addition, most studies focus on general organizational security management. Accordingly, this paper aimed to design a model to measure the level of security management of companies utilizing ICT outsourcing. Specifically, this paper analyzed security vulnerabilities that could occur in ICT outsourcing that may be mapped with the accorded security measures as solutions to deduce items for ICT outsourcing security inspections. Next, this paper developed an ICT outsourcing security level quantification model by verifying the validity of the security inspection items deduced and by estimating item-specific weighted points. Additionally, the applicability of the ICT outsourcing security level quantification model developed was verified by applying it to actual companies.

ACS Style

Jewook Moon; Chanwoo Lee; Sangho Park; Yanghoon Kim; Hangbae Chang. Mathematical model-based security management framework for future ICT outsourcing project. Discrete Applied Mathematics 2018, 241, 67 -77.

AMA Style

Jewook Moon, Chanwoo Lee, Sangho Park, Yanghoon Kim, Hangbae Chang. Mathematical model-based security management framework for future ICT outsourcing project. Discrete Applied Mathematics. 2018; 241 ():67-77.

Chicago/Turabian Style

Jewook Moon; Chanwoo Lee; Sangho Park; Yanghoon Kim; Hangbae Chang. 2018. "Mathematical model-based security management framework for future ICT outsourcing project." Discrete Applied Mathematics 241, no. : 67-77.

Journal article
Published: 16 April 2018 in Sustainability
Reads 0
Downloads 0

Recently, the work environments of organizations have been in the process of transitioning into smart work environments by applying cloud computing technology in the existing work environment. The smart work environment has the characteristic of being able to access information assets inside the company from outside the company through cloud computing technology, share information without restrictions on location by using mobile terminals, and provide a work environment where work can be conducted effectively in various locations and mobile environments. Thus, in the cloud computing-based smart work environment, changes are occurring in terms of security risks, such as an increase in the leakage risk of an organization’s information assets through mobile terminals which have a high risk of loss and theft and increase the hacking risk of wireless networks in mobile environments. According to these changes in security risk, the reactive digital forensic method, which investigates digital evidence after the occurrence of security incidents, appears to have a limit which has led to a rise in the necessity of proactive digital forensic approaches wherein security incidents can be addressed preemptively. Accordingly, in this research, we design a digital forensic readiness model at the level of preemptive prevention by considering changes in the cloud computing-based smart work environment. Firstly, we investigate previous research related to the cloud computing-based smart work environment and digital forensic readiness and analyze a total of 50 components of digital forensic readiness. In addition, through the analysis of the corresponding preceding research, we design seven detailed areas, namely, outside the organization environment, within the organization guideline, system information, terminal information, user information, usage information, and additional function. Then, we design a draft of the digital forensic readiness model in the cloud computing-based smart work environment by mapping the components of digital forensic readiness to each area. To verify the draft of the designed model, we create a survey targeting digital forensic field-related professionals, analyze their validity, and deduce a digital forensic readiness model of the cloud computing-based smart work environment consisting of seven detailed areas and 44 components. Finally, through an analytic hierarchy process analysis, we deduce the areas that should be emphasized compared to the existing work environment to heighten the forensic readiness in the cloud computing-based smart work environment. As a result, the weightings of the terminal information Universal Subscriber Identity Module(USIM) card, collect/gain virtual machine image, etc.), user information (user account information analysis, analysis of user’s used service, etc.), and usage information (mobile OS artifact timeline analysis, action analysis through timeline, etc.) appear to be higher than those of the existing work environment. This is analyzed for each organization to preemptively prepare for the components of digital forensic readiness in the corresponding areas.

ACS Style

Sangho Park; Yanghoon Kim; Gwangmin Park; Onechul Na; Hangbae Chang. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability 2018, 10, 1203 .

AMA Style

Sangho Park, Yanghoon Kim, Gwangmin Park, Onechul Na, Hangbae Chang. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability. 2018; 10 (4):1203.

Chicago/Turabian Style

Sangho Park; Yanghoon Kim; Gwangmin Park; Onechul Na; Hangbae Chang. 2018. "Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment." Sustainability 10, no. 4: 1203.

Journal article
Published: 01 March 2018 in Sustainability
Reads 0
Downloads 0

In this paper, we aim to provide a power trade system that will promote a sustainable electrical energy transaction ecosystem between prosumers and consumers of smart homes. We suggest a blockchain-based peer-to-peer (P2P) energy transaction platform be implemented to enable efficient electrical energy transaction between prosumers. We suggest the platform be built on the blockchain, as this technology allows a decentralized and distributed trading system, and allows a more transparent, trustworthy and secure P2P trading environment. We believe that such characteristics of the blockchain are necessary in electrical energy transactions within the smart home environment because the smart home aims to enhance user comfort and security, along with energy conservation and cost-savings. First, we classify the two different types of P2P trade to identify which will best benefit from the use of the suggested blockchain-based P2P energy-transaction platform. Within the two types of P2P trade, that we classify (pure P2P trade and hybrid P2P trade), the hybrid P2P trade will benefit more from a blockchain-based P2P energy-transaction platform. In the blockchain-based P2P energy-transaction platform, a smart contract is embedded in the blockchain and called an energy tag. The energy tag will set conditions for making every future energy transaction more cost-efficient while maintaining the most ideal and high-quality energy selection. With the blockchain-based energy tag in the energy-transaction process, multiple energy resources and home appliances will be democratically connected in order to provide users with high-quality, low-cost energy at all times and locations. In this paper, we provide simulation results that compare the unit price of electrical energy on the suggested platform to the unit price of electrical energy set by currently existing conventional power-generation companies. Additionally, we present simulation results that calculate how long initial investments to create a smart home environment that enables P2P energy transactions will take to be paid back. Based on simulation results, we believe that, in the long run, the suggested blockchain-based P2P energy-transaction platform will create a sustainable energy-transaction environment between consumers and prosumers, and the expanding ecosystem will enable the development of a trusted, sustainable, secure and energy-efficient energy transaction environment.

ACS Style

Lee Won Park; Sanghoon Lee; Hangbae Chang. A Sustainable Home Energy Prosumer-Chain Methodology with Energy Tags over the Blockchain. Sustainability 2018, 10, 658 .

AMA Style

Lee Won Park, Sanghoon Lee, Hangbae Chang. A Sustainable Home Energy Prosumer-Chain Methodology with Energy Tags over the Blockchain. Sustainability. 2018; 10 (3):658.

Chicago/Turabian Style

Lee Won Park; Sanghoon Lee; Hangbae Chang. 2018. "A Sustainable Home Energy Prosumer-Chain Methodology with Energy Tags over the Blockchain." Sustainability 10, no. 3: 658.

Article
Published: 04 September 2017 in The Journal of Supercomputing
Reads 0
Downloads 0

RFID is a technology to identify objects such as products and things with radio frequencies, which is recognized as a basic technology to realize ubiquitous society and has attracted significant attention of government, industries, and academic world. In addition, RFID has an enormous ripple effect as a killer application on a variety of business areas including logistics/distribution, military, or food/safety in particular because of a high identification rate, contactless identification media, propagation range, and scalability being able to connect and communicate with other communication networks. But there are insufficient studies of analyzing quantitative effects on economic effectiveness generated after implementing RFIDs through empirical analysis. Therefore, this study analyzed economic effect that can be obtained by implementing RFIDs into companies. Based on the study results, common effects were concentrated on the primary benefit, and the administration and management work had common effects of the third benefit.

ACS Style

Hangbae Chang. Performance evaluation framework design for smart sensor business. The Journal of Supercomputing 2017, 74, 4481 -4496.

AMA Style

Hangbae Chang. Performance evaluation framework design for smart sensor business. The Journal of Supercomputing. 2017; 74 (9):4481-4496.

Chicago/Turabian Style

Hangbae Chang. 2017. "Performance evaluation framework design for smart sensor business." The Journal of Supercomputing 74, no. 9: 4481-4496.

Journal article
Published: 04 April 2017 in Sustainability
Reads 0
Downloads 0

Most business services based on Ubiquitous Computing are being designed with a sole focus on the technological sector, without considering business elements. In light of this trend, this study was intended to design a user-oriented u-Business service for preventing and promptly responding to industrial disasters at shipbuilding sites using a systematic methodology. Specifically, major danger elements of disasters in need of preferential preventive and responsive measures were derived as business opportunities unfulfilled by the current process, and then a u-Business service was developed to prevent/respond to such dangers. Statistical analysis was performed on the developed services according to evaluation models, and the final u-Business service was selected based on this analysis. Resources and information systems were designed to support the chosen service.

ACS Style

Taehee Joe; Hangbae Chang. A Study on User-Oriented and Intelligent Service Design in Sustainable Computing: A Case of Shipbuilding Industry Safety. Sustainability 2017, 9, 544 .

AMA Style

Taehee Joe, Hangbae Chang. A Study on User-Oriented and Intelligent Service Design in Sustainable Computing: A Case of Shipbuilding Industry Safety. Sustainability. 2017; 9 (4):544.

Chicago/Turabian Style

Taehee Joe; Hangbae Chang. 2017. "A Study on User-Oriented and Intelligent Service Design in Sustainable Computing: A Case of Shipbuilding Industry Safety." Sustainability 9, no. 4: 544.

Journal article
Published: 31 May 2016 in The Journal of Society for e-Business Studies
Reads 0
Downloads 0
ACS Style

Hyojik Lee; Bora Ryu; Hwayoung Kim; Jeakyun Lee; Yein Kim; Hangbae Chang. A Study for Enhancing Necessity of Certain Industrial Security Charge Department through Investigating Domestic Industrial Security Organization. The Journal of Society for e-Business Studies 2016, 21, 121 -133.

AMA Style

Hyojik Lee, Bora Ryu, Hwayoung Kim, Jeakyun Lee, Yein Kim, Hangbae Chang. A Study for Enhancing Necessity of Certain Industrial Security Charge Department through Investigating Domestic Industrial Security Organization. The Journal of Society for e-Business Studies. 2016; 21 (2):121-133.

Chicago/Turabian Style

Hyojik Lee; Bora Ryu; Hwayoung Kim; Jeakyun Lee; Yein Kim; Hangbae Chang. 2016. "A Study for Enhancing Necessity of Certain Industrial Security Charge Department through Investigating Domestic Industrial Security Organization." The Journal of Society for e-Business Studies 21, no. 2: 121-133.

Journal article
Published: 01 May 2016 in Computers & Electrical Engineering
Reads 0
Downloads 0

As society become increasingly information-oriented, the use of cyberspace is also expanding, and people are exposed to various cyber-terror threats and security incidents. Additionally, according to the development of convergence security that extends from information security to all industrial sectors, the demand for an information security workforce has increased along with the development of the information security industry. Despite the expectation of a shortage of information security workforce due to the great demand surpassing the supply of available workers, the turnover among existing information security experts is very serious. The reasons why this turnover is such problem are as follows. First, the expert training system for the information security workforce is incomplete. Second, these experts do not receive an appropriate education for turnover in information security area or information as an insufficient data against the distribution or job mobility of the information security area though there are various occupations in information security area. Therefore, this paper will conduct research on the distribution of information security roles and the frequency of such job mobility in order to resolve these problems.

ACS Style

Sangho Park; Yanghoon Kim; Hangbae Chang. An empirical study on security expert ecosystem in the future IoT service environment. Computers & Electrical Engineering 2016, 52, 199 -207.

AMA Style

Sangho Park, Yanghoon Kim, Hangbae Chang. An empirical study on security expert ecosystem in the future IoT service environment. Computers & Electrical Engineering. 2016; 52 ():199-207.

Chicago/Turabian Style

Sangho Park; Yanghoon Kim; Hangbae Chang. 2016. "An empirical study on security expert ecosystem in the future IoT service environment." Computers & Electrical Engineering 52, no. : 199-207.

Journal article
Published: 11 April 2016 in Multimedia Tools and Applications
Reads 0
Downloads 0

Studies are increasing on seeking to cultivate multimedia security professional personnel by providing core knowledge necessary for the safe use of multimedia information. Time is needed for such academic studies to be applied to actual education. However, it should be quickly applicable to security professional education according to the characteristics of the security industry that is very sensitive to a fast-changing environment. For the purpose of examining research trends in the area of multimedia security, a network analysis was conducted focusing on keywords to understand the correlation among studies by analyzing well-known academic journals and identifying the directional nature of research. Based on the keywords researched, a meta-analysis was conducted. The result showed that the highest frequency keyword was ‘certification’ and keywords formed correlations affecting research trends. For consistency between such research and studies, it is important to increase the relative importance of the multimedia information security management area subject through which the business of companies can be understood. It is also necessary to create balanced thinking and a perspective for multimedia security.

ACS Style

Hyeri Kim; Sangho Park; Hangbae Chang. A gap analysis study between multimedia security research and education by meta data analysis. Multimedia Tools and Applications 2016, 75, 12779 -12793.

AMA Style

Hyeri Kim, Sangho Park, Hangbae Chang. A gap analysis study between multimedia security research and education by meta data analysis. Multimedia Tools and Applications. 2016; 75 (20):12779-12793.

Chicago/Turabian Style

Hyeri Kim; Sangho Park; Hangbae Chang. 2016. "A gap analysis study between multimedia security research and education by meta data analysis." Multimedia Tools and Applications 75, no. 20: 12779-12793.

Original articles
Published: 22 March 2016 in Enterprise Information Systems
Reads 0
Downloads 0

Inter-organisational collaboration is important for achieving qualitative and quantitative performance improvement in the global competitive environment. In particular, the extent of collaboration between the mother company and its suppliers is important for the profitability and sustainability of a company in the automobile industry, which is carried out using a customisation and order production system. As a result of the empirical analysis in this study, the collaborative information sharing cycle is shortened and the collaborative information sharing scope is widened. Therefore, the level of collaboration is improved by constructing an IT collaboration system.

ACS Style

Soyoung Sung; Yanghoon Kim; Hangbae Chang. Improving collaboration between large and small-medium enterprises in automobile production. Enterprise Information Systems 2016, 12, 1 -17.

AMA Style

Soyoung Sung, Yanghoon Kim, Hangbae Chang. Improving collaboration between large and small-medium enterprises in automobile production. Enterprise Information Systems. 2016; 12 (1):1-17.

Chicago/Turabian Style

Soyoung Sung; Yanghoon Kim; Hangbae Chang. 2016. "Improving collaboration between large and small-medium enterprises in automobile production." Enterprise Information Systems 12, no. 1: 1-17.

Journal article
Published: 05 March 2016 in Wireless Personal Communications
Reads 0
Downloads 0

Recently, info-communications technologies are pervading ubiquitous environments to evolve into internet of things environments. Studies on services to implement these internet of things environments have been carried out actively. To introduce the internet of things environment services in practice through businesses, there is a need to design them in advance about how much they correspond with business goals. Designs of the internet of things environment services, however, have been conducted around verification of their economic feasibility from a macroscopic view so far, and there is still no profitability evaluation for particular internet of things environment services possible in the future.

ACS Style

Hyojik Lee; Onechul Na; Yanghoon Kim; Hangbae Chang. A Study on Designing Public Safety Service for Internet of Things Environment. Wireless Personal Communications 2016, 93, 447 -459.

AMA Style

Hyojik Lee, Onechul Na, Yanghoon Kim, Hangbae Chang. A Study on Designing Public Safety Service for Internet of Things Environment. Wireless Personal Communications. 2016; 93 (2):447-459.

Chicago/Turabian Style

Hyojik Lee; Onechul Na; Yanghoon Kim; Hangbae Chang. 2016. "A Study on Designing Public Safety Service for Internet of Things Environment." Wireless Personal Communications 93, no. 2: 447-459.

Journal article
Published: 30 November 2015 in The Journal of Society for e-Business Studies
Reads 0
Downloads 0

A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System Industrial Security;Information Security;Research Security;Security Level Evaluation;Industry-Centric; Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.

ACS Style

Je-Min Bae; Sanggeun Kim; Hangbae Chang. A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System. The Journal of Society for e-Business Studies 2015, 20, 177 -191.

AMA Style

Je-Min Bae, Sanggeun Kim, Hangbae Chang. A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System. The Journal of Society for e-Business Studies. 2015; 20 (4):177-191.

Chicago/Turabian Style

Je-Min Bae; Sanggeun Kim; Hangbae Chang. 2015. "A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System." The Journal of Society for e-Business Studies 20, no. 4: 177-191.