• Title/Summary/Keyword: 관리방법론

Search Result 2,307, Processing Time 0.043 seconds

Application Packing Methodology Through Gap Analysis (갭(Gap) 분석을 통한 어플리케이션 패키징 방법론)

  • 장권혁;김의경;이상윤;이용천;윤명상
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.295-297
    • /
    • 2003
  • 정보화 서비스를 제공하기 위해서는 사실 기반의 데이터, 데이터의 전달을 위한 네트워크기술, 그리고, 정보를 원하는 목적에 맞게 처리하여 원하는 사용자에게 전달하여 부가적인 가치를 부여하게 하는 응용 소프트웨어로 크게 나눌 수 있을 것이다. 이러한 응용 소프트웨어 중에는 기술적, 관리적, 문서적인 측면에서 체계적으로 관리되어 있지 않아, 그 상품성을 제대로 인정 받지 못해 진정한 가치를 평가 받고 있지 못하고 있는 실정이다. 따라서, 일반 응용 소프트웨어를 상품화하여 제대로 그 가치를 평가 받을 수 있도록 준비하는 과정을 제안하고자 한다.

  • PDF

An Analytical Research on the Computerization and Information Networking System Development for the National College and University Libraries in Korea (정보화사회에 대응할 국립대학 도서관 전산화 및 정보네트웍 형성에 따른 단계 분석 및 현황 조사)

  • 한상완;정준민;남태우
    • Journal of the Korean Society for information Management
    • /
    • v.9 no.1
    • /
    • pp.83-130
    • /
    • 1992
  • In this paper, the computerization and information networking system development are studied and discussed analytically for the Korean national college and university libraries.

  • PDF

사이버전 대응을 위한 국방 정보보호환경 분석과 보안관리모델 연구방향 고찰

  • Choi, Kwang-Bok
    • Review of KIISC
    • /
    • v.21 no.6
    • /
    • pp.7-15
    • /
    • 2011
  • 국방 정보보호환경은 IT기술의 발전과 함께 사이버 공간이 제5의 전장으로 부각되면서 해킹을 통한 군사자료유출, 시스템 파괴 등 외부로부터의 지속적인 위협에 직면해 있다. 본 논문에서는 이러한 사이버전 위협에 효과적으로 대응하기 위한 방안으로 보안사고사례, 조직, 제도, 인력양성, 법규 및 제도 등 국방 정보보호환경을 분석하고 이를 바탕으로 정보체계의 보안수준을 진단하기 위한 보안관리모델 개발의 필요성과 ISMS 방법론을 고려한D-ISMS(Defence ISMS) 연구방향을 고찰한다.

A Structured Methodology of Optimal Combination of Eco-Energy Development Technologies: Focusing on Wind Power Technology Combination (친환경 에너지 개발 기술 최적 조합 선정을 위한구조적 방법론: 풍력 발전 기술 조합 선정을 중심으로)

  • Kwon, Ohbyung;Cui, Nan
    • Journal of Environmental Policy
    • /
    • v.10 no.1
    • /
    • pp.93-127
    • /
    • 2011
  • Investment on technology to obtain green energy is prevailing all over the world. The technology development project is more likely to involve multiple sub-projects, each of which is related to develop elementary technology when the project is larger and nation-wide. However, the methodologies identifying optimal combination of elementary technologies among the candidates have been very few. Hence, the purpose of this paper is to propose a novel methodology which provides an optimal combination of green energy technologies. To do so, to-be developed technologies are clustered with multiple categories. Among the technologies, based on Delphi method, the experts select a representative technology, which is indispensible to the green energy system and has the highest connectivity with other elementary technologies. Then the methodology selects an elementary technology from each technology category based on two metrics: Relatedness with representative technology and project risk. To show the feasibility of the proposed methodology, we applied the methodology to an actual windmill development project.

  • PDF

An Exploratory Study of Collective E-Petitions Estimation Methodology Using Anomaly Detection: Focusing on the Voice of Citizens of Changwon City (이상탐지 활용 전자집단민원 추정 방법론에 관한 탐색적 연구: 창원시 시민의 소리 사례를 중심으로)

  • Jeong, Ha-Yeong
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.85-106
    • /
    • 2019
  • Recently, there have been increasing cases of collective petitions filed in the electronic petitions system. However, there is no efficient management system, raising concerns on side effects such as increased administrative workload and mass production of social conflicts. Aimed at suggesting a methodology for estimating electronic collective petitions using anomaly detection and corpus linguistics-based content analysis, this study conducted the followings: i) a theoretical review of the concept of collective petitions, ii) estimation of electronic collective petitions using anomaly detection based on nonparametric unsupervised learning, iii) a content similarity analysis on petitions using n-gram cosine angle distance, and iv) a case study on the Voice of Citizens of Changwon City, through which the utility of the proposed methodology, policy implications and future tasks were reviewed.

A Study on Methodology for Standardized Platform Design to Build Network Security Infrastructure (네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.203-211
    • /
    • 2012
  • Network security infrastructure is constantly developing based on the combination and blending of various types of devices. From the form of distributed control, the phased defense policy such as fire walls, virtual private communication network, invasion prevention system, invasion detection system, corporate security management, and TSM (Telebiometrics System Mechanism), now it consolidates security devices and solutions to be developed to the step of concentration and artificial intelligence. Therefore, this article suggests network security infrastructure design types concentrating security devices and solutions as platform types and provides network security infrastructure design selecting methodology, the foundational data to standardize platform design according to each situation so as to propose methodology that can realize and build the design which is readily applied and realized in the field and also can minimize the problems by controlling the interferences from invasion.

A Conceptual Schema Integration through Extraction of Common Similar Subschemas : An Case Study of Multidatabase System (공통 유사 서브스키마 추출을 통한 개념적 스키마 통합 : 다중 데이터베이스 시스템 적용사례)

  • Koh, Jae-jin;Lee, Won-Jo
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.775-782
    • /
    • 2004
  • Recently, most of global enterprises have geographically distributed organization, thus have distributed information systems which have distributed database systems. So, it is difficult for these systems to provide common views for the application programs of end users. One of solutions to solve these difficulties is an MDBS(Multidatabase System) A method to effectively implement MDBS is a schema integration. This paper proposes a methodology for a schema integration through extraction of common similar subschemas Our methodology is consisted of 5 phases : affinity analysis, extraction of similar subschemas, decision of imtegration order, resolution of semantic conflict, and schema integration. To verify the usability of our methodology, a case study is implemented with an object of MDBS. At a result, our approach can effectively be applied to the extraction of common similar subschemas and schema integration.

Study of Analysis for Autonomous Vehicle Collision Using Text Embedding (텍스트 임베딩을 이용한 자율주행자동차 교통사고 분석에 관한 연구)

  • Park, Sangmin;Lee, Hwanpil;So, Jaehyun(Jason);Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.160-173
    • /
    • 2021
  • Recently, research on the development of autonomous vehicles has increased worldwide. Moreover, a means to identify and analyze the characteristics of traffic accidents of autonomous vehicles is needed. Accordingly, traffic accident data of autonomous vehicles are being collected in California, USA. This research examined the characteristics of traffic accidents of autonomous vehicles. Primarily, traffic accident data for autonomous vehicles were analyzed, and the text data used text-embedding techniques to derive major keywords and four topics. The methodology of this study is expected to be used in the analysis of traffic accidents in autonomous vehicles.

An Analysis of Theoretical Orientations and Methodologies of Archival Appraisal (기록평가의 이론적 지향과 방법론 분석)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.75
    • /
    • pp.5-39
    • /
    • 2023
  • More than 20 years after introducing the public records management system in Korea, the criteria and methodologies for archival appraisal and selection are still unclear. Modern archival appraisal theories have developed in two orientations, such as provenance and pertinence. This study aims to investigate the methodological implications of each theoretical orientation of archival appraisal and to suggest some directions for improving the appraisal practices and policies. Firstly, archival appraisal theories are analyzed according two orientations. Secondly, four methodologies are derived from combining the macro/micro dimension and theoretical orientations. Thirdly, the methodological orientations of the criteria for selecting permanent records presented in the Public Records Management Act are analyzed. Finally, based on these analyses, appraisal policies and practices for selecting the records with permanent value are proposed to be improved.

xPMP : UML-based High-Level Modeling of Policy-Driven Management Applications (xPMP - 정책 기반 관리 어플리케이션의 상위 단계 모델링)

  • Tran, Doan Thanh;Choi, Eun-Mi
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.209-218
    • /
    • 2008
  • The Unified Modeling Language becomes popular to specify, visualize, construct, and document software-intensive systems, especially in supporting the design phase of software engineering. Most of designs in UML have focused on firm designing of software system structure. Recently, some researches have raised additional demands in many emerging complex software systems, such as aspect-oriented design. In this paper, we work on the dynamic aspect of policy-driven architecture. We present a UML-based high-level modeling of policy-driven management which is applicable in various application domains. In order to manage a number of activities of applications, dynamics and flexibility should be supported with policies consistently on different resources in the same context. Thus, a methodology of meta-modeling to represent dynamic aspects of policy-driven architecture is studied. Based on our methodology, we could achieve meta-modeling to develop a number of policy-driven management applications.

  • PDF