• Title/Summary/Keyword: 서비스 개발 프로세스

Search Result 567, Processing Time 0.027 seconds

Development of a ICT Convergence Business Model based on Smart Phone (스마트 폰 기반의 ICT 융합 비즈니스 모델 개발)

  • Park, Young-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.81-89
    • /
    • 2015
  • Recently, according to rapid technological development trend of mobile devices revolutionary transforming our lives in various fields, thereby combining the latest in communications technology. These mobile devices to celebrate the digital convergence era are now created a new business model due to mobility. The mobile business operators obtains a user's location information using the smart phone. The mobile business operators provide users with the area or building-related information for the user on. The mobile business operators provide users profiles to advertisers and product sellers. In this study, I propose the mobile business model and that there are no technical problems design a conceptual framework on mobile agents for mobile operators.

Open Innovation Models in SMEs (중소기업의 오픈 이노베이션 모형)

  • Yoon, Byung-Un;Lee, Sung-Joo
    • Journal of Korea Technology Innovation Society
    • /
    • v.13 no.1
    • /
    • pp.160-183
    • /
    • 2010
  • Recently, although many firms conduct open innovation through collaboration with other innovation actors, little attention has been paid to research and case study with regard to SMEs. However, since the capability of SMEs is too insufficient to access external resources and collaborate with other firms, SMEs have practical needs for active open innovation. In addition, although a lot of SMEs depend on external resources in terms of distribution, services and sales, most of open innovation-related research concentrate on R&D and production. Therefore, this research aims at presenting various types, methods and policy to stimulate the open innovation of SMEs. Typical types of open innovation which SMEs can take will be identified and then a relevant open innovation type will be matched on the basis of the characteristics of sectors. The results of this research will be helpful for policy makers to promote open innovation in SMEs.

  • PDF

A Feature-Oriented Requirement Tracing Method with Value Analysis (가치분석을 통한 휘처 기반의 요구사항 추적 기법)

  • Ahn, Sang-Im;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.1-15
    • /
    • 2007
  • Traceability links are logical links between individual requirements and other system elements such as architecture descriptions, source code, and test cases. These are useful for requirements change impact analysis, requirements conflict analysis, and requirements consistency checking. However, establishing and maintaining traceability links places a big burden since complex systems have especially yield an enormous number of various artifacts. We propose a feature-oriented requirements tracing method to manage requirements with cost benefit analysis, including value consideration and intermediate catalysis using features. Our approach offers two contributions to the study of requirements tracing: (1)We introduce feature modeling as intermediate catalysis to generate traceability links between user requirements and implementation artifacts. (2)We provide value consideration with cost and efforts to identify traceability links based on prioritized requirements, thus assigning a granularity level to each feature. In this paper, we especially present the results of a case study which is carried out in Apartment Ubiquitous Platform to integrate and connect home services in an apartment complex in details.

  • PDF

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Study on Asset Valuation Method in Educational Facilities Delivered by BTL (BTL 사업 학교시설의 자산 가치평가 기법 연구)

  • Lee, Young-Joo;Soh, Ji-Yune;Lee, Jun-Bok;Han, Choong-Hee;Chae, Myung-Jin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.4
    • /
    • pp.40-49
    • /
    • 2011
  • A number of BTL projects for educational facilities have been augmented because of the increase of newtown development and deflationary policy of class size for learning efficiency. As the operation and maintenance costs rapidly increase, the budget for operation and maintenance is expected to be short. Therefore the asset management maximizing asset value is required to clarify the budget plan and distribution and provide a qualitatively high service. The main objective of this research is to establish asset valuation process in educational facilities delivered by BTL project. In order to meet the research objective, the asset valuation process is established by literature reviews, expert advice, and lessons learned from the developed countries. The developed process includes depreciation by internal accounting law, the core element of valuation, and asset valuation process. The results of the research will be help to offer the qualitatively high service and explain the standard of budget plan. It will assist commencing the asset management system.

Simulation in Nursing Education in South Korea: An Integrative Review (한국 간호교육에서의 시뮬레이션: 통합적 고찰)

  • Jang, Ae Ri;Kim, Ja Sook;Kim, Su Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.525-537
    • /
    • 2020
  • This study aimed to determine the current state and characteristics of simulation-based operating processes in nursing education based on the Jeffries theoretical framework in South Korea by taking an integrated look at study findings in order to provide a scientific basis for future simulation-based operating processes. We searched eight databases, including the Korea Education and Research Information Service, National Library, Korean Studies Information Service System, National Digital Science Library, Korea Institute of Science and Technology Information, KOREAMED, and Korean Medical Database, using terms "simulation" and "nursing" as keywords in November 2017 in the Korean language. Sixteen studies were identified, reviewed, and appraised in this integrative review. The literature was categorized into these themes: general study characteristics, operation method, teaching and learning methods, subject characteristics, outcome variables, and theoretical framework. The simulation processes in nursing education in South Korea that were analyzed in this study did not fully reflect the main concepts suggested in the NLN Jeffries simulation framework. Thus, simulation program developers need to consider and incorporate a variety of strategies, based on the identification of essential components, to improve simulation effectiveness.

Design of a Project Management Maturity Evaluation Model using Information System Audit Checklists (정보시스템 감리점검항목을 활용한 프로젝트 조직성숙도 평가 모델의 설계)

  • Kim, Yun-Seok;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.105-117
    • /
    • 2008
  • Generally, project audit provides the service which accomplishes a project successfully by checking the management activity of information system project, indicating a controversial point and reflecting the improvement issues based on project audit check list. In addition, the projects are managed by using the project management maturity model based on process. However, the effect is not big as we except projects performance of real world. In this paper. to solve these problems, the project management maturity evaluation model which is connected with project audit check list and organizational maturity model survey items is designed. Thus, we propose the model which can improve the project performance through the project evaluation of customer's project and development part and the evaluation of organization level as we design that it is possible to not only audit the project but also evaluate it before and after the project.

Analysis of Domestic and International Infrastructure Asset Management Practices and Improvement Strategy (국내외 사회기반시설물 자산관리 사례 분석을 통한 국내 발전 방안)

  • Chae, Myung-Jin;Lee, Giu;Kim, Jung-Ryul;Cho, Moon-Young
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.2
    • /
    • pp.55-64
    • /
    • 2009
  • In many developed countries, social infrastructure asset management has become an important issue for the effective operation and management, performance improvement, and providing better quality services. This paper describes infrastructure asset management practices in Korea and in the developed countries. Learning lessons from those countries and improve the asset management practices in Korea is the main theme of this paper. Considering the definition and basic structure of infrastructure asset management, authors have analyzed main concerns regarding infrastructure management, techniques, organizations (systems), and processes. The requirements and considerations are presented to overcome the limitations of current maintenance system. This paper will assist adopting infrastructure asset management in Korea and provide guide for the infrastructure maintenance.

A Study on the Logistics Information Synchronization based Smart SCM Model (물류정보동기화 기반의 Smart SCM 모델에 관한 연구)

  • Kim, JangGoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.5
    • /
    • pp.311-318
    • /
    • 2013
  • Recently, there have been many studies on RFID-based SCM. Yet, studies of synchronizing errors caused by tracking logistics information in supply chain, and activating & monitoring RFID infra is still insufficient. Also, there is no case of developing the intelligent SCM system enabling total monitoring and controlling RFID Infra by applying these technologies. Logistics information synchronization based Smart SCM model is intelligent supply chain service model to monitor the status of the RFID equipments in supply chain and the synchronization of the logistics process in each logistics point through one integrated view, as well as to react instantly by providing the information to help the various decision makings, when the emergency occurs. By adopting global logistics standard, RFID related standard specification, EPCIS standard, and SSI middleware platform, this model provides the domestic standard specification.

The Effect of UI Usability of Mobile Healthcare Applications on Technostress and Continuous Use Intention: Focusing on Elderly Users (모바일 헬스케어 애플리케이션의 UI 사용성이 테크노스트레스와 지속사용의도에 미치는 영향: 고령의 사용자를 중심으로)

  • Cha, Jaehyuk
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.295-305
    • /
    • 2021
  • The purpose of this study is to empirically verify how UI usability of mobile healthcare applications affects the perception of technostress and continuous use of elderly users. Through this, the effect of UI usability of mobile healthcare applications on technostress and continuous use intention was demonstrated for 199 people aged over 60. As a result, all four sub-factors of UI usability had a significant effect on technostress, and the magnitude of the influence was found to be in the order of content, process, design, and system. On the other hand, it was found that technostress had a significant effect on the intention of continued use. Through the above results, a UI design strategy that can lead to continuous use by relieving the technostress experienced by the elderly was suggested. This provides academic and practical implications for the future development and service direction of mobile healthcare applications for the elderly.