International Journal of Information Science

International Journal of Information Science is a peer-reviewed journal that publishes original papers of high scientific value in all areas of information science. The journal publishes high-quality, refereed articles. It emphasizes a balanced coverage of both theory and practice. It fully acknowledges and vividly promotes a breadth of the discipline of information sciences.


Sangkyun Kim

Editorial Board Member of International Journal of Information Science

Associate Professor, Department of Industrial Engineering, Kangwon National University, South Korea

Research Areas

Information System, Information Security, Technology Management, Engineering Education

Education

2005DoctorPhilosophy in Industrial Engineering & Cognitive Science, Yonsei University
1998MasterIndustrial Engineering, Yonsei University
1996BachelorControl & Instrumentation Engineering, Chungang University

Experience

2002-2007Director, Somansa
2001-2007Adjunct Professor, Yonsei University
2001-2002Manager, KCC Information & Communication
1999-2000Senior Researcher, ITR
1996-1999CTO, SecureSoft
1996Manager, Linux Security (Subsidiary of Jungwha IT)
1994-1996Researcher, Jungwha IT

Membership

Program Committee & Chairman, Summer Conference, Korea Society of Computer Information, 2009
Chairman of Information Security Division, Korea Society of Computer Information, 2009
Member of Advisory Committee, KISA, June 2006
Session Chair of ICCSA2005 & 2006
International Program Committee & Session Chair of KES2005 & 2006
Election committee for ISMS auditors of KISA, May 2005
Technical Committee of IITA, May 2001-Present
Managing Committee of PKI Forum, April 2001-August 2001
Managing Committee of NETSEC-KR '98, 1998
Technical Committee of NITQ, 1998
Managing Committee of OSTA, 1997-1998

Publications: Conferences/Workshops/Symposiums/Journals/Books

[1]  Auditing methodology on legal compliance of enterprise information systems, International Journal of Technology Management, vol.54, nos.2/3, 2011.
[2]  Linking information engineering and security engineering with a problem-solving perspective, International Journal of Technology Management, vol.54, nos.2/3, 2011.
[3]  Integrated security framework for industrial R&D environments, International Journal of Software Engineering and Knowledge Engineering, vol.20, no.1, 2010.
[4]  Assessment on security risks of customer relationship management systems, International Journal of Software Engineering and Knowledge Engineering, vol.20, no.1, 2010.
[5]  IT compliance of industrial information systems: technology management and industrial engineering perspective, Journal of Systems and Software, vol.80, no.10, 2007.
[6]  Common defects in information security management system of Korean companies, Journal of Systems and Software, vol.80, no.10, 2007.
[7]  A study on development methodology of business model in ubiquitous technology environment, International Journal of Technology Management, vol.38, no.4, 2007.
[8]  Framework for email records management in corporate environments, International Journal of Technology Management, vol.38, no.4, 2007.
[9]  A study on decision consolidation methods using analytic models for security systems, Computers & Security, vol.26, no.2, 2007.
[10]  High-performing AAA architecture in massive IPv4 networks, Future Generation Computer Systems, vol.23, no.2, 2007.
[11]  A study on development of business factor in ubiquitous technology, Lecture Notes in Artificial Intelligence, vol.4251, 2006.
[12]  General drawing of the integrated framework for security governance, Lecture Notes in Artificial Intelligence, vol.4251, 2006.
[13]  A study on the development of evaluation framework for usability of digital TV, Lecture Notes in Computer Science, vol.3983, 2006.
[14]  Security engineering methodology based on problem solving theory, Lecture Notes in Computer Science, vol.3983, 2006.
[15]  Economic load dispatch using quadratic interior point method, International Journal of Operations and Quantitative Management, vol.11, no.3, 2005.
[16]  An evaluation methodology of enterprise security management systems, International Journal of Operations and Quantitative Management, vol.11, no.3, 2005.
[17]  Enterprise security architecture in business convergence environments, Industrial Management and Data Systems, vol.105, no.7, pp.919-316, 2005.
[18]  Assessment methodology on maturity model of ISMS, Lecture Notes in Artificial Intelligence, vol.3683, 2005.
[19]  CSFs for HCI in ubiquitous computing environments, Lecture Notes in Artificial Intelligence, vol.3683, 2005.
[20]  Practical design recovery techniques for embedded operating system on complying with RTCA/DO-178B and ISO/IEC 15408, Lecture Notes in Artificial Intelligence, vol.3683, 2005.
[21]  A study on authentication mechanism using robot vacuum cleaner, Lecture Notes in Computer Science, vol.3483, 2005.
[22]  A case study on the development of employee internet management system, Lecture Notes in Computer Science, vol.3482, 2005.
[23]  Cost-benefit analysis of security investments: a methodology and case study, Lecture Notes in Computer Science, vol.3482, 2005.
[24]  Security of the internet-based instant messenger: risks and safeguards, Internet Research: Electronic Networking Applications and Policy, vol.15, no.1, 2005.
[25]  Decision supporting method with the analytic hierarchy process model for the systematic selection of COTS-based security control, Lecture Series on Computer Science and Computational Sciences, vol.1, 2004.
[26]  Applying the ISO17799 baseline controls as a security engineering principle under the Sarbanes-Oxley Act, Lecture Series on Computer Science and Computational Sciences, vol.1, 2004.
[27]  Architecture of authentication mechanism for emerging t-commerce environments, Lecture Notes in Computer Science, vol.3331, 2004.
[28]  A case study on the real-time click stream analysis system, Lecture Notes in Computer Science, vol.3314, 2004.
[29]  Implementation of the security system for instant messengers, Lecture Notes in Computer Science, vol.3314, 2004.
[30]  An information engineering methodology for the security strategy planning, Lecture Notes in Computer Science, vol.3043, 2004.
[31]  Introduction to an integrated methodology for development and implementation of enterprise information systems, Journal of System and Softwares, vol. 60 , 2002.