Sangkyun Kim

According to our database1, Sangkyun Kim
  • authored at least 32 papers between 2002 and 2011.
  • has a "Dijkstra number"2 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Auditing methodology on legal compliance of enterprise information systems.
IJTM, 2011

Linking information engineering and security engineering with a problem solving perspective.
IJTM, 2011

2010
Guest Editors' Introduction.
International Journal of Software Engineering and Knowledge Engineering, 2010

Assessment on Security Risks of Customer Relationship Management Systems.
International Journal of Software Engineering and Knowledge Engineering, 2010

Integrated Security Framework for Industrial R&d Environments.
International Journal of Software Engineering and Knowledge Engineering, 2010

2007
Governance of Information Security: New Paradigm of Security Management.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

Common defects in information security management system of Korean companies.
Journal of Systems and Software, 2007

IT compliance of industrial information systems: Technology management and industrial engineering perspective.
Journal of Systems and Software, 2007

Methodology of security engineering for industrial security management systems.
Journal of Systems and Software, 2007

A study on the development methodology of the business model in ubiquitous technology.
IJTM, 2007

Framework for e-mail records management in corporate environments.
IJTM, 2007

High performance AAA architecture for massive IPv4 networks.
Future Generation Comp. Syst., 2007

Special section: Information engineering and enterprise architecture in distributed computing environments.
Future Generation Comp. Syst., 2007

A study on decision consolidation methods using analytic models for security systems.
Computers & Security, 2007

2006
General Drawing of the Integrated Framework for Security Governance.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Study on Development of Business Factor in Ubiquitous Technology.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV).
Proceedings of the Computational Science and Its Applications, 2006

Security Engineering Methodology Based on Problem Solving Theory.
Proceedings of the Computational Science and Its Applications, 2006

2005
The pay-per-use revolution in the internet world.
Online Information Review, 2005

Security of the internet-based instant messenger: Risks and safeguards.
Internet Research, 2005

Enterprise security architecture in business convergence environments.
Industrial Management and Data Systems, 2005

Assessment Methodology on Maturity Level of ISMS.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

CSFs for HCI in Ubiquitous Computing Environments.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Practical Design Recovery Techniques for Embedded Operating System on Complying with RTCA/DO-178B and ISO/IEC15408.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Study on Authentication Mechanism Using Robot Vacuum Cleaner.
Proceedings of the Computational Science and Its Applications, 2005

Cost-Benefit Analysis of Security Investments: Methodology and Case Study.
Proceedings of the Computational Science and Its Applications, 2005

A Case Study on the Development of Employee Internet Management System.
Proceedings of the Computational Science and Its Applications, 2005

2004
Architecture of Authentication Mechanism for Emerging T-commerce Environments.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

An Information Engineering Methodology for the Security Strategy Planning.
Proceedings of the Computational Science and Its Applications, 2004

A Case Study on the Real-Time Click Stream Analysis System.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Implementation of the Security System for Instant Messengers.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2002
Introduction to an integrated methodology for development and implementation of enterprise information systems.
Journal of Systems and Software, 2002


  Loading...