• Title/Summary/Keyword: methodology(方法論)

Search Result 4,522, Processing Time 0.027 seconds

A Study on Vulnerability Analysis Methodology for Composite Security Product Evaluation (합성형 정보보호제품 평가를 위한 취약성 분석 방법 개발에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.19-24
    • /
    • 2008
  • Common Criteria is a standard to estimate safety of information protection product such as network-level firewall system and intrusion detection system. Recently, CC version is changed from CC v.2.3 to CC v.3.1. CC v.3.1 estimation methodology requires a secured dictionary accomodation preparation for information protection product. In this research, progressed CC v3 base composition product test and research about vulnerability analysis method. Further, this paper presents specific plan sorting composition style information protection product examination methodology to existing principle and detailed methodology.

  • PDF

A Study on Methodology to Assess IT Investment by ROI (IT ROI에 의한 투자 타당성 평가 방법론 연구)

  • Kim, Young-Woon;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.1
    • /
    • pp.53-67
    • /
    • 2006
  • It is difficult to justify an IT investment unless the investment is expected to have a direct impact on a corporation's performance under rapidly changing business environment. It is important to demonstrate the benefit of the investment through a pre-investment assessment process to induce the executive's decision. This paper presents a methodology to assess the investment by analyzing cost and benefit of the investment. This methodology shows tangible cost as well as hidden cost by analyzing total cost of ownership. The methodology also produces ROI by performing cost benefit analysis including financial and non-financial factors. This paper suggests a systematic way to support If investment decision marking process by evaluating the investment objectively.

  • PDF

Formal Methodology for Safety Analysis of Security Protocols (보안 프로토콜의 안전성 분석을 위한 정형적 방법론)

  • Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • With the development of wire and wireless based networks, a various security protocols have been proposed to protect important resources and user information against attackers. However, many security protocols have found oかy to be later vulnerable to attacks. In this Paper, we introduce the formal methodology to verify the safety of security protocols in the design phase, and we take advantage of the formal methodology which uses Casper/CSP and FDR tools by introducing the verification example of EKE protocol and BCY protocol. Lastly, we propose a new BCY protocol after verifying it's safety.

An Improvement of Cadastral Non-coincidence Surveying Method using Digital Orthophoto (수치정사사진을 이용한 지적불부합지 조사 방법의 개선)

  • Hong, Sung-Eon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.2 s.36
    • /
    • pp.23-32
    • /
    • 2006
  • This study shows that new methodology improved the problem of unaided eye test level with the digital orthophoto technique can survey more objectively and efficiently any cadastral non-coincidence than existing prior methodologies. For applying to it, we explore eligible other methodologies, and then build up the application strategy of them. New prototype system is implemented with it. Also, we say the availability of new methodology by applying to study area. As a result, we suggest cadastral non-coincidence surveying method based on point-correspondence more objective and more efficient. As a result of comparing with old method and new on same study area for making adequacy, they hardly ever has the difference of accuracy. Constantly, cadastral non-coincidence surveying method based on point-correspondence is acceptable way on the cadastral survey.

  • PDF

A Participatory Spatial Design Methodology using Virtual Reality (가상현실(VR)을 활용한 참여형 공간설계방법론)

  • Choi, Jae-Yeon;Kim, Eun-Hyung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.253-267
    • /
    • 2016
  • This paper is on a participatory spatial design methodology using Virtual Reality, which can be applied to the overall spatial design process. Participation in the current spatial design has several limitations: one-sided communication process, difficulty of understanding the given information and partial participation in the design process. Virtual Reality can be an ideal visualization tool for Geodesign and PPGIS(Public Participation GIS), which is presented as a highest step at the participation ladder. A participatory methodology is proposed to take advantage of Virtual Reality. In order to support participation through Virtual Reality in spatial design process, theories about the participation are compared to derive the new roles of Virtual Reality and the roles are formulated in the participatory spatial design methodology. By applying the methodology to the design process and implementing each stage through Virtual Reality, the design performance of each step can be verified in the methodology. As a result, design ideas can be effectively understood through Virtual Reality experiences. It is also confirmed that the interactions in Virtual Reality and participation are possible in the entire design process.

Development of TCAD calibration methodology for ESD simulation and TLP measurement analysis (ESD 시뮬레이션과 TLP 측정해석을 위한 TCAD calibration methodology 개발)

  • 염기수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.538-542
    • /
    • 1999
  • New methodology of parameter calibration is proposed for TCAD simulation of nMOSFET in ESD(Electro-Static Discharge) protection circuits. Recently, TLP(Transmission Line Pulsing) measurement has received great interest due to the ability of analyzing device characteristics when ESD pulse is applied to the ESD pulse is applied to the ESD protection circuits. This paper describes new methodology of analyizing TLP measurement, TCAD simulation, and parameter calibration.

  • PDF

A Product Model Centered Integration Methodology for Design and Construction Information (프로덕트 모델 중심의 설계, 시공 정보 통합 방법론)

  • Lee Keun-Hyoung;Kim Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.99-106
    • /
    • 2002
  • Researches on integration of design and construction information from earlier era focused on the conceptual data models. Development and prevalent use of commercial database management system led many researchers to design database schemas for enlightening of relationship between non-graphic data items. Although these researches became the foundation fur the proceeding researches. they did not utilize the graphic data providable from CAD system which is already widely used. 4D CAD concept suggests a way of integrating graphic data with schedule data. Although this integration provided a new possibility for integration, there exists a limitation in data dependency on a specific application. This research suggests a new approach on integration for design and construction information, 'Product Model Centered Integration Methodology'. This methodology achieves integration by preliminary research on existing methodology using 4D CAD concept. and by development and application of new integration methodology, 'Product Model Centered Integration Methodology'. 'Design Component' can be converted into digital format by object based CAD system. 'Unified Object-based Graphic Modeling' shows how to model graphic product model using CAD system. Possibility of reusing design information in latter stage depends on the ways of creating CAD model, so modeling guidelines and specifications are suggested. Then prototype system for integration management, and exchange are presented, using 'Product Frameworker', and 'Product Database' which also supports multiple-viewpoints. 'Product Data Model' is designed, and main data workflows are represented using 'Activity Diagram', one of UML diagrams. These can be used for writing programming codes and developing prototype in order to automatically create activity items in actual schedule management system. Through validation processes, 'Product Model Centered Integration Methodology' is suggested as the new approach for integration of design and construction information.

  • PDF

A study on modeling of university information system using the soft systems methodology (소프트시스템 방법론을 이용한 대학정보시스템 모형개발에 관한 연구)

  • 오경묵
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.2
    • /
    • pp.69-88
    • /
    • 1998
  • In real life, the problems that organizations face are often not well packaged: they are frequently complex and complicated, especially when it is concerned about computer network services. The principal aim of the study is to investigate what sort of network sytem will enable uni ersities to utilize the information resources they have and need in an effective and efficient way. Therfore seven stages of the Soft systems methodology were applied to get the optimal model, then networking, maintaining, monitoring and training sytems were developed as the result.

  • PDF

Metaphor and Archives (상징아카이빙 대통령기록을 중심으로)

  • Lee, Young-Nam
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.125-187
    • /
    • 2013
  • This essay would focus on a kinds of new archival strategy. The main frame has been the kinds of activities regulated by laws, or formal activities since 1999. In the case of presidential archives has no another frame. There had never kinds of presidential archives system until President Noh, if anything. It means that the frame has some important points. Although it is, we have to say about the limits of the frame. This essay show 'metaphor frame' for archival system. I think that we have to guess there are methodologies below the two frames. One is quantitative study methodology, and another is qualitative research methodology. The later focuses on the experiences for making narratives. We have to know that this methodology is out of fashioned in the field of history department and cultural anthropology department for the purpose of alternative studies. This essay says about 'archival field description' and 'narrative records' for the new records in archival field. I have to say about that we needs to discuss about kinds of new archival discours. And to conclude, we should manage the records in culture.

An Evaluation Methodology for Selection of IT Outsourcing Service Vendors (IT 아웃소싱 서비스 수행업체 선정을 위한 평가 방법론 개발)

  • Jeong, Seon-Phil;Kim, Yeong-Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.4
    • /
    • pp.153-163
    • /
    • 2007
  • Many organizations have been outsourcing not only simple tasks but Information Systems and business processes rapidly. IT outsourcing is considered as a critical strategy of businesses these days. Anyhow, many companies still have IT solution problems even though they have been outsourcing their IT department or functions. Moreover, many companies have difficulties when it comes to the selection a proper IT outsourcing service vendor. This study focused on evaluation methodology for small and medium sized organizational selection of IT outsourcing provider. This study's results is a presentation of an evaluation methodology using the AHP weighted value of the factors and the factors' variables. Small and medium sized organizational managers can refer to this study's result as an evaluation index and methodology at the beginning of their IT outsourcing project or for changing their vendors.

  • PDF