Yonghee Shin
YOU?
Author Swipe
View article: An Empirical Analysis on a Predictive Method of Systematic Segmentation in Volatile High-Tech Markets
An Empirical Analysis on a Predictive Method of Systematic Segmentation in Volatile High-Tech Markets Open
High-tech markets are unpredictable owing to rapid technology innovation, diverse customer needs, high competition, and other elements. Many scholars have attempted to explain the uncertainty in high-tech markets using their own various ap…
View article: A Framework for Evaluating Traceability Benchmark Metrics
A Framework for Evaluating Traceability Benchmark Metrics Open
Many software traceability techniques have been developed in the past decade, but suffer from inaccuracy. To address this shortcoming, the software traceability research community seeks to employ benchmarking. Benchmarking will help the co…
View article: User Adoption Model under Service Competitive Market Structure for Next-Generation Media Services
User Adoption Model under Service Competitive Market Structure for Next-Generation Media Services Open
As information technology rapidly develops and the period required to enter new technology shortens, there emerges a wide variety of alternatives for consumers. When there are many alternatives in the market, users choose after making comp…
View article: Towards a taxonomy of techniques to detect cross-site scripting and SQL injection vulnerabilities
Towards a taxonomy of techniques to detect cross-site scripting and SQL injection vulnerabilities Open
Since 2002, over half of reported cyber vulnerabilities are caused by input validation vulnerabilities . Over 50 % of input validation vulnerabilities were cross-site scripting and SQL injection vulnerabilities in 2006, based on the (US) N…
View article: SQLUnitGen: Test Case Generation for SQL Injection Detection
SQLUnitGen: Test Case Generation for SQL Injection Detection Open
More than half of all of the vulnerabilities reported can be classified as input manipulation, such as SQL injection, cross site scripting, and buffer overflows. Increasingly, automated static analysis tools are being used to identify inpu…
View article: A maturity model of evaluating requirements specification techniques
A maturity model of evaluating requirements specification techniques Open
It is important to evaluate and understand the state-of-art technologies to position our research and invest our energy and resources in more effective ways. Unfortunately, no systematic approach has been introduced to evaluate the maturit…