• 제목/요약/키워드: Commit Information

검색결과 105건 처리시간 0.022초

블록체인 기반 깃 랭크 시스템 (Git Rank System - Based on Blockchain)

  • 김관용;심영수;정호진;김승진;박주형
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.805-806
    • /
    • 2023
  • 본 논문에서는 무료 Git 저장소로 전 세계 1억 명 이상의 IT개발자가 사용하는 Github[1]의 commit 수와 issue 해결 등의 사용 시 토큰을 차등 부여해 사용자 종합 순위를 선정하고 정량적인 성취 수준을 파악할 수 있는 시스템을 마련해 개발자들의 건전한 경쟁심과 개발 욕구를 향상시키는 애플리케이션을 개발하였다.

A Lifestyle-Routine Activity Theory (LRAT) Approach to Cybercrime Victimization: An Empirical Assessment of SNS Lifestyle Exposure Activities

  • Jihae Suh;Jiseon Choe;Jinsoo Park
    • Asia pacific journal of information systems
    • /
    • 제30권1호
    • /
    • pp.53-71
    • /
    • 2020
  • The Internet and all of its possibilities and applications have changed individuals' lifestyles in relation to socializing, working, and how they spend their leisure time. Social networking sites (SNSs), such as Facebook or Instagram, are ideal settings for interacting with others but, unfortunately, they are also ideal settings for motivated offenders to commit cybercrimes. Thus SNS users may be more vulnerable to cybercrime. The purpose of this study is to investigate the occurrence of cybercrime victimization, specifically cyber-harassment, cyber-impersonation, and hacking. Self-report surveys collected from a sample of 147 respondents were examined using the moderated multiple regression analysis and a logistic regression analysis to determine possible relationships between SNS lifestyle exposure activities and cybercrime victimization. The results indicate moderate support for the application of lifestyle-routine activity theory (LRAT) to cybercrime victimization. Possible educational and managerial implications, as well as suggestions for future research, are discussed.

통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발 (Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment)

  • 정해용;김상훈
    • Journal of Information Technology Applications and Management
    • /
    • 제12권4호
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

A Study on the Realities and Preventive Countermeasures of Child Abuse Committed by Biological Parents by information analysis.

  • Ryu, Chae-Hyoung;Yoon, Hyun-Seok
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.171-177
    • /
    • 2019
  • In this paper, we analyze the current phenomenon of child abuse crimes based on the information gathered by the National Child Protection Agency. The purpose of this paper is to diagnose the seriousness of child abuse by biological parents based on the analyzed information and propose measures against it. Comprehensive and integrated measures are needed for child abuse committed by biological parents due to abuse concealment, continuity of damage, and inactive national intervention by considering punishment on attackers through national intervention, fundamental in-depth psychological counseling, therapeutic care, promoting recovery of victims, and ultimately continuous and regular management and monitoring as a long-terms measure. To do so, developing customized and individual educational programs and make them obligations can be first presented to identify child abuse in advance and build up preventive systems based on the principle of family preservation. In addition, problems should be addressed at a fundamental level by performing various and active therapeutic treatments such as psychological treatment, mental treatment, or drug treatment gradually and through phases for biological parents who commit child abuse and contributing to recovering the relationship. Furthermore, proper protection and treatment service should be provided to children victimized by abuse by extending professional children care facilities and adopting the professional family commission system as measures by separating family.

Scheduling of Concurrent Transactions in Broadcasting Environment

  • Al-Qerem, Ahmad;Hamarsheh, Ala;Al-Lahham, Yaser A.;Eleyat, Mujahed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1655-1673
    • /
    • 2018
  • Mobile computing environment is subject to the constraints of bounded network bandwidth, frequently encountered disconnections, insufficient battery power, and system asymmetry. To meet these constraints and to gain high scalability, data broadcasting has been proposed on data transmission techniques. However, updates made to the database in any broadcast cycle are deferred to the next cycle in order to appear to mobile clients with lower data currency. The main goal of this paper is to enhance the transaction performance processing and database currency. The main approach involves decomposing the main broadcast cycle into a number of sub-cycles, where data items are broadcasted as they were originally sequenced in the main cycle while appearing in the most current versions. A concurrency control method AOCCRBSC is proposed to cope well with the cycle decomposition. The proposed method exploits predeclaration and adapts the AOCCRB method by customizing prefetching, back-off, and partial backward and forward validation techniques. As a result, more than one of the conflicting transactions is allowed to commit at the server in the same broadcast cycle which empowers the processing of both update and read-only transactions and improves data currency.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • 제9권2호
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification

  • Liang, Xinyu;Chen, Jing;Du, Ruiying;Zhao, Tianrui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권8호
    • /
    • pp.2507-2528
    • /
    • 2022
  • Blockchain interoperability, which refers in particular to the ability to access information across blockchain systems, plays the key role for different blockchains to communicate with each other, and further supports the superstructure built on top of the cross-chain mechanism. Nowadays, blockchain interoperability technology is still in its infancy. The existing cross-chain scheme such as BTCRelay requires that the smart contract in a blockchain to download and maintain block headers of the other blockchain, which is costly in maintenance and inefficient to use. In this paper, we propose a supervision mechanism between blockchains, called Surveillant. Specially, the new entities called dual-functional nodes are introduced to commit the real-time information from the blockchain under supervision to the supervising blockchain, which enables users to have efficient cross-chain verification. Furthermore, we introduce Merkle mountain range for blocks aggregation to deal with the large-scale committing data. We propose the design of long orphan branch counter to trace the bifurcations in the blockchain under supervision. The existing incentive mechanism is improved to encourage the behaviors of dual-functional nodes. In Surveillant, the analysis and experimental results demonstrate that users are able to have efficient cross-chain verification with low maintenance overhead.

방송환경에서 이중 버전과 타임스탬프에 기반을 둔 낙관적 동시성 제어 기법 (Optimistic Concurrency Control based on 2-Version and TimeStamp for Broadcast Environment : OCC/2VTS)

  • 이욱현;황부현
    • 정보처리학회논문지D
    • /
    • 제8D권2호
    • /
    • pp.132-144
    • /
    • 2001
  • 방송환경은 서버(server)와 클라이언트간 대역폭이 서버에서 클라이언트쪽으로는 크고 클라이언트에서 서버쪽으로의 대역폭은 상대적으로 많이 작은 비대칭적(asymmetric) 특수한 환경이다. 또한 대부분의 방송 환경 응용시스템들은 클라이언트측에서 발생한 주로 주식 데이터, 교통 정보와 새로운 뉴스와 같은 여러 가지 다양한 정보를 검색하는 읽기전용 즉 질의 거래들을 허락한다. 그러나, 기존의 여러 가지 동시성 제어 기법들은 이러한 특수성을 고려하지 않음으로써 꽤 높은 데이터 경쟁 상태의 방송 환경에 적용될 때 성능 감소가 일어난다. 이 논문에서는 방송환경에서 가장 적절한 OCC/2VTS(Optimistic Concurrency Control based on 2-Version and TimeStamp)를 제안한다. OCC/2VTS는 캐쉬 내에 두 버전을 사용함으로써 타임스탬프 기법으로 클라이언트가 질의 거래를 자체 해결 할 수 있도록 하였다. 질의 거래 시작 후 2번의 무효화 방송을 통해 읽기 연산 대상 데이터 항목의 값이 바뀌지 않는다면 질의 거래가 갱신 거래의 완료와 상관없이 무사히 완료된다. 그 결과 첫째, 서버에게 완료 요구를 위해 정보를 보내는 기회가 감소하고 무효화 보고서 내에 갱신된 최신의 값을 포함하여 클라이언트들에게 방송함으로써 최근 데이터 값을 서버에게 요구하는 기회를 줄여 비대칭적 대역폭을 효율적으로 활용한다. 둘째, 질의 거래의 완료율을 최대한 높여 처리율을 향상시킨다.

  • PDF

방송환경에서 갱신 거래 우선 낙관적 동시성 제어 기법 (Optimistic Concurrency Control with Update Transaction First for Broadcast Environment : OCC/UTF)

  • 이욱현;황부현
    • 정보처리학회논문지D
    • /
    • 제9D권2호
    • /
    • pp.185-194
    • /
    • 2002
  • 대부분의 방송 환경 응용 시스템들은 클라이언트측에서 발생한 주로 주식 데이터, 교통 정보와 새로운 뉴스와 같은 여러 가지 다양한 정보를 검색하는 읽기전용 즉 질의 거래들을 허락한다. 그러나, 기존의 여러 가지 동시성 제어 기법들은 이러한 특수성을 고려하지 않음으로써 방송 환경에 적용될 때 성능 감소가 일어난다. 이 논문에서는 방송환경에서 가장 적절한 OCC/UTF(Optimistic Concurrency Control with Update Transaction First)를 제안한다. OCC/UTF는 갱신 거래에 의해 무효화된 데이터를 먼저 일기 연산한 질의 거래가 비직렬 가능성으로 인한 철회 없이 갱신된 새로운 값을 다시 읽는다. 그럼으로써 직렬 순서가 유지되어 갱신 거래의 완료와 상관없이 해당 질의 거래가 무사히 완료된다. 그 결과 첫째, 서버에게 질의 거래 완료 요구를 할 필요가 없으며 무효화 보고서 내에 갱신된 최신의 값을 포함하여 클라이언트들에게 방송함으로써 최근 데이터 값을 서버에게 요구하는 기회를 줄임과 동시에 서버는 새로운 값을 재방송할 필요가 없기 때문에 비대칭적 대역폭을 효율적으로 활용한다. 둘째, 질의 거래의 완료율을 최대한 높여 처리율을 향상시킬 수 있다.

청소년의 온라인 게임과 사이버 일탈에 관한 연구 (Online Games and Cyber Delinquency among Adolescents)

  • 성윤숙
    • 가정과삶의질연구
    • /
    • 제22권2호
    • /
    • pp.37-57
    • /
    • 2004
  • Online games are very popular among adolescents in Korea. They sometimes lead to cyber delinquency. An ethnographic analysis was conducted in this study to address the social significance of online games. The results showed that the adolescents who were addicted to or indulged in the games were likely to commit delinquency online and/or offline. Delinquency in an information society is typically individualistic, whereas deviant behaviors in an industrial society are more social and collective, such as group violence. Parenting style, student-teacher relationship, peer pressure, game environment, and recreational facilities for the adolescents were intertwined with such adolescent delinquency. Finally, some implications of the online games from the perspective of social welfare practice were discussed to prevent online game indulgence and addiction and adolescent delinquency.