• Title/Summary/Keyword: Software Organization

Search Result 511, Processing Time 0.023 seconds

A Software Six-Sigma Tool Selection Process based on Organizational Business Value (조직의 비즈니스 가치 기반 소프트웨어 식스 시그마 도구 선정 프로세스)

  • Kwon, Tae-Yong;Baik, Jong-Moon;Ryu, Ho-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.440-444
    • /
    • 2009
  • In order to improve the effectiveness of software process improvement, more than two models can be use to compensate the weakness of each other. One of integrated models is the one in which CMMI and software six sigma. However, it is very difficult for a small software development organization to select and apply an appropriate set of six sigma tools since there are a lot of six sigma tools and statistical knowledge is required. In this paper, we suggest a six sigma tool selection process to help small organizations select six sigma tools effectively based on organization business value. Thereby, small organizations can efficiently implement CMMI by adopting an appropriate set of six sigma toolkits.

A System of Software Asset Management in Company using the Server (서버를 이용한 사내 소프트웨어 자산관리 시스템)

  • Lee, Young Gyo;Park, Jin Kyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Illegal software use have been abroad through online (internet) and offline (CD, DVD, USB, etc.). It infringes intellectual property rights and weakens the will to software development. Also, it generates the software errors and virus intrusion in PC. It hinders national software industry and induces the personal and national trade friction. Many group (company, office, organization, institution, etc.) have been realized the prohibition of illegal software use. But, it is too hard to monitor and control illegal software use. In this paper, we propose a method of software management in a group. A software module of client agency is installed in all PC of the group. A main server of the software management controls the all of the PC through the communication. The server blocks the install of illegal software, permits the install / use of honest goods software, monitors the license (term, amount) in all the PC. The system prevents errors of illegal software use, all cuts the virus intrude through the illegal software, improves the performance of PC relatively.

A Design of Power-saving PC System Using the IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템의 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.89-97
    • /
    • 2013
  • The green IT technology is being introduced in diverse sectors, especially in the data center and green computer sectors. Rack-type PCs, which have been developed by improving the computer hardware, are effective for data centers and large businesses, but they are not usually introduced in small organizations such as small and medium businesses and schools because they require high initial costs. Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. In this paper, a technique wherein the server has a restriction in providing the IP address to the computers that has no power-saving software is proposed, so that users will cooperate in the PC power-saving system to avoid inconvenience. In order to provide restricted IP address periodically, the server makes a request of power-saving software installation check for user's PC. Proposed technique is more effective ways to save computer energy, because it does not depend on specific systems or organizations.

Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments (Software Defined Network(SDN) 환경에서 비인가 소프트웨어 차단 기법)

  • Kang, Nam-Gil;Kwon, TaeWook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.393-399
    • /
    • 2019
  • In a situation where an unauthorized SW brought into the organization without being authorized is emerging as a threat to the network security, the security of the network based on the SDN(Software-Defined Network) can be strengthened through the development of the security application considering the organization's characteristics. Security technology of existing SDN environment has been studied to protect internal network from external networks such as firewalls and Intrusion Detection Systems, but the research for resolving insider threat was insufficient. Therefore, We propose a system that protects the internal network from unauthorized SW, which is one of the insider threats in the SDN environment.

A Method for Establishment of Case-based Software Maintenance Maturity Model (사례기반의 소프트웨어 유지보수 성숙도 모델 수립 방안)

  • Kim, Ji-Hyeok;Kim, Chang-Jae;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.718-731
    • /
    • 2009
  • Software Maintenance needs to continually improve from corrective maintenance to operational management and service improvement. In this study, we propose a software maintenance maturity model and its evaluation criteria based on 4 maintenance projects of K organization. For the proposal, we derive 13 process areas and 64 evaluation criteria based on some references such as SMMM, ITSMM, ITIL. We evaluate the criteria using 5-point scale, and then establish the maturity model of K organization classified by levels of the maturity model based on the evaluation result. And, to verify and improve the maturity model of K organization, we propose improvements for evaluation criteria. In addition, we apply the maturity model to the 4 projects, evaluate the projects, and propose improvements for the projects based on the evaluation result to identify how the model shows software maintenance improvement.

A Design of PC Power-Saving System Security Using IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템 보안 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.

An Empirical Research for the Software Process Capability and Organizational Performance in Korea (SW프로세스능력에 관한 현황과 기업성과에 관한 연구)

  • 나미자;남기찬;김정욱;박수용
    • Journal of Korean Society for Quality Management
    • /
    • v.30 no.1
    • /
    • pp.22-46
    • /
    • 2002
  • Recently, increasing attention has been paid to building the software quality and software productivity due to ongoing software crisis. To overcome such problem, one of the many alternatives is to use the capability maturity model (CMM) suggested by the Software Engineering Institute(SEI), focusing on the improvement of software progress. This research is proposed the theoretical framework for CMM based on the previous studies, and review the status of software process on the software development organization. We then examine the impact of the software process capability on the organizational performance including financial measures and non-financial measures. Hypotheses on software process capability were tested 144 organizational units. The 62.5% of foreign companies are distribute to the second and third level, the Korean firms in this study are indicated the first level. Result indicate that maturity of software process may be served the key predictor of organizational performance, in particular the positive relationship between the software process and non-financial performance index such as customer service, IT Infrastructure, marketing, supplier and purchaser, production and operation.

Deduction of the Application Plan for Railway Software Safety Criteria (철도소프트웨어 안전기준의 현장 적용방안 도출)

  • Shin, Kyung-Ho;Joung, Eui-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2007.10c
    • /
    • pp.232-234
    • /
    • 2007
  • In this paper, the safety criteria and framework of railway software which is developing presently is examined. The software development capability and organization of railway company in korea are investigated through interview and are analyzed. Then the application plan for railway software safety criteria is deduced to apply criteria to railway industry effectively.

  • PDF

A study on the selection method of the software developer using AHP (AHP를 이용한 소프트웨어 외주업체 선정방안에 관한 연구)

  • 김승렬;정희숙
    • Korean Management Science Review
    • /
    • v.12 no.2
    • /
    • pp.15-30
    • /
    • 1995
  • The objectives of this paper are to provide software developer selection criteria and to develop evaluation framework using AHP (Analytic Hierarchy Process). The selection criteria are extracted from Software Development Life Cycle, Quality Assurance, and Productivitiy of Organization. In this paper, the selection model is proposed and its examples are illustrated. Though some further research is required, the proposed model can be regarded as a basis of a DSS for the selection of the software developer.

  • PDF