Acknowledgement
This paper was supported by the Fund of the Sahmyook University in 2020.
References
- Byun, J. W., Kim, J. H., Rhee, S. Y., and Hwang, M. S.(2010), "A Technique for Classifying Requirement/Stakeholder and Generating Information for Negotiation Using Kano Model and Statistical Method," Journal of the Information Science Society: Software and Applications, Vol.37, No.3, pp. 161-169
- Byun, J. W., Hwang, M. S., and Rhew, S. Y.(2012), "Metrics for Representing Consistency between Requirements and Objectives/Constraints," Journal of the Information Science Society: Software and Applications, Vol. 39, No. 4, pp. 269-279
- Cho, H. K., Lee, J. H.(2013), "A Study of Design Process for Sensor-based Smart clothing based on requirement engineering," Emotional Science, Vol.16, No.3, pp. 397-408
- Choi, S. K., Choi, E. H.(2013), "Requirements Engineering & Management by the Object Oriented Methodology in the Weapon system," Jouranl of Information and Security, Vol.13, No.3, pp. 55-62
- G. Kotonya, L. Sommerville(2000), 「Requirements Engineering: Processes and Techniques」, John Willey and Sons.
- Joo, Y. K., Kim, D. S., Rhee, H. K., and Kim, H. W.(2014), "Effects of the Information System Operation Audit on the Quality of Information System," Journal of the Korean Society of Knowledge and Information Technology, Vol.9, No.6, pp. 781-795
- K. Wiegers(2003), 「SoftwareRequirement,2nded」, MicrosoftPress.
- Kim, H. W., Lee, H. M., and Kim, D. S.(2011), "Design on Fixed Quantity Analytical Model for Information System Audit," Journal of the Korea Contents Association, Vol. 11, No.2, pp. 88-100
- Kim, H. K.(2013), "A Study on the Security Audit Model of Financial Institutions using ISMS and PIMS," Graduate School of Information and Communication, Konkuk University, Master's Thesis
- Lee, H. O.(2002), A Study on Compulsory Information System Audit Plan, National Information Society Agency.
- Lee, J. Y., Kim, D. S., and Kim, H. W.(2010), "Design of Information Protection Audit Model in Information System Audit," Journal of Digital Industry Information Society, Vol.6, No.2, pp. 233-245
- Lee, S. W., Choi, M. B.(2014), "An Establishment of the Process System for Software Requirements Engineering," Journal of the Korean Society for Internet, Broadcasting and Communication, Vol.14, No.1, pp. 37-49 https://doi.org/10.7236/JIIBC.2014.14.1.37
- Ministry of Public Administration and Security(2012), E-government law, National Law Information Center
- Moon, M. K., Yeom, K. H.(2004), "An Approach to Managing Requirements as a Core Asset in Software Product - Line," Journal of the Information Science Society: Software and Applications, Vol. 31, No. 8, pp. 1010-1026
- National Information Society Agency(2009a), Information Systems Audit Check Guide, National Information Society Agency.
- National Information Society Agency(2009b), Information System Audit Manual, National Information Society Agency
- National Information Society Agency(2013), Information System Audit Implementation Guide_V2.1, National Information Society Agency.
- R. S. Pressman, 「Software Engineering A Practitioner's Approach,7thed」, McGraw-Hill, 2009.
- S. Robertson(2006), Mastering the Requirements Process, 2nded, AddisonWesley.
- Song, S. K., Park, S. Y., and Lee, J. H.(2012). "Thesaurus-Based Non-Functional Requirements Elicitation Technique for Agile Methodology," Journal of the Information Science Society: Software and Applications, Vol. 39, No. 8, pp. 655-663
- Soren Lauesen(2006), Software Requirements: Styles & Techniques, AddisonWesley.
- The Standish Group, "CHAOS Summary 2009", The Standish Group, 2009.