• Title/Summary/Keyword: Information Requirement Analysis

Search Result 659, Processing Time 0.036 seconds

Executive Information Systems Literature (1983-1992) : A Survey

  • Lee, Jung-Yung;Suh, Chang-kyo
    • The Journal of Information Systems
    • /
    • v.3
    • /
    • pp.17-36
    • /
    • 1994
  • Since its first appearance in the late 1970s and early 1980s, executive information system (EIS) has been reported to improve executives' productivity in line with the rapid growth of the EIS market. In this paper, we aim to provide both researchers and practitioners with a comprehensive bibliography on EIS. this bibliography consists of papers which were extracted from (1) INSPECT commercial database service, (2) previous surveys in books and journals, and (3) major conference proceedings. A total of 227 papers, published between 1983 and 1992, were identified and categorized by topic, and journal or conference. The major findings indicate that EIS has been widely used in both profit oriented organizations and non-profit oriented organizations and that the nature of system has been the most active topic among the researchers and practitioners. However, the survey suggests that further research should be focused on development and implementation methodologies of EIS, especially requirement analysis and EIS planning.

  • PDF

Analysis of Digital VHF data system requirement for electronic Navigation (e-Navigation 실현을 위한 디지털 VHF 데이터 시스템의 요구사항 분석)

  • Park, Ok-Sun;Kim, Dae-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.593-596
    • /
    • 2010
  • Currently, maritime information service is provided by a variety of equipments such as satellites, radar and VHF devices with independent standards and protocols. However, the increase of vessel traffic and development of global marine industries need an infrastructure providing seamless information transfer for the safety, security and protection of the marine environment. Therefore, we propose features and requirements of future VHF data systems and equipments as a component of e-Navigation.

  • PDF

Generation of Internet Server Profile Using Packet Mining (패킷 마이닝 기법을 사용한 인터넷 서버 프로파일의 자동생성 연구)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.39-41
    • /
    • 2002
  • Management of internal Internet servers is increasingly becoming an important task. According to meet this requirement, they use service log analysis tools and network monitoring tools. But these are not enough to produce advanced management information considering contents of Internet services. Therefor we propose a system and let it detect Internet server systems existing in internal network and individuate those systems with providing profile. Internet server profile includes system's basic information, network traffic information, and Internet service usage information.

  • PDF

A Requirement Analysis on IPTV over Next Generation Networks (NGN에서 IPTV 서비스를 위한 요구사항 및 문제점 분석)

  • Lee, Seung-Ik;Lee, Dong-Man;Park, Ju-Young;Kang, Shin-Gak
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.106-111
    • /
    • 2006
  • 현재 다양한 상용망에서 끊김 없이 동일 서비스를 이용하고자 하는 사용자의 요구를 충족시키기 위해서 상용망을 IP 프로토콜로 융합하는 차세대 인터넷, 즉 NGN (Next Generation Network) 망이 도입되었다. 이와 같이 연결망의 대역폭이 확장되면서 다양한 멀티미디어 서비스에 대한 요구가 늘어나게 되고 나아가 실시간 TV 스트리밍 서비스에 대한 요구가 극대화되었다. 본 논문에서는 NGN과 IPTV의 서비스 정의 및 요구 사항을 분석하여 NGN의 응용 서비스로서 사용되기 위한 IPTV 서비스의 필요 요건이 무엇인지를 도출하였다. 나아가 NGN의 이동성 및 다양성 등의 특성에 따른 전송 경로의 다양화, 손실 차별화, 서비스 끊김 등의 문제점을 도출하고 이를 해결하기 위해 고려해야 하는 연구 이슈 및 방향 등에 대해 기술한다.

  • PDF

An Analysis of Security Threats and Security Requirements on the Designated PC Solution

  • Lee, Kyungroul;Lee, Sun-Young;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.29-39
    • /
    • 2017
  • In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.

Requirement analysis for visualization of condition assessment in 3D Bridge Model (3차원 교량모델에서의 상태평가정보 가시화를 위한 요구사항 분석)

  • Huang, Meng-Gang;Kim, Bong-Geun;Lee, Sang-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2010.04a
    • /
    • pp.238-241
    • /
    • 2010
  • This paper proposed an approach to integrate bridge condition assessment related information with a 3D bridge model to visualize bridge condition assessment information in the 3D bridge model. In this approach, bridge information model plays a centric role in the data access and realizes the integration of bridge initial design and historical bridge maintenance records. Behind the bridge information model is a rational database. After the system requirements for this approach, several IFC data model extensions are suggested.

  • PDF

Business Model based Requirement Analysis from developing An Embedded System through Product-Line (제품-계열적 임베디드 시스템 개발을 위한 비즈니스 기반 요구분석)

  • Hong, Ki-Sam;Yoon, Hee-Byung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.331-333
    • /
    • 2005
  • 제품-계열 방법은 소프트웨어 개발시 나오는 산출물들을 핵심자산으로 만들어 놓고, 이를 체계적으로 재사용할 수 있도록 지원하기 위한 프레임워크 역할을 한다. 그 초점은 소프트웨어 아키텍처나 상세설계 또는 코드에 맞추어져 있어서 임베디드 시스템 개발시 임베디드라는 특성화된 요구사항을 분석하고, 도출 하는데 미흡한 부분이 있다. 본 논문에서는 임베디드 시스템 개발시 요구분석 단계에 IDEF0 비즈니스 모델을 적용한 Feature 도출 및 분석 방법을 제안한다. 제안된 방법은 도메인 요구사항을 관리하는 측면에서 전체시스템에 대한 정확한 요구사항 도출과 분석이 가능하고, 도출된 Feature에 대한 공통성과 가변성을 식별 하는데 효율적이다.

  • PDF

A Study on the Methodology for Defect Management in the Requirements Stage (요구사항단계의 결함관리를 위한 방법론에 관한 연구)

  • Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.7
    • /
    • pp.205-212
    • /
    • 2020
  • Defects are an important factor in the quality of software developments. In order to manage defects, we propose additional information of search and classification. Additional information suggests a systematic classification scheme and method of operation. In this study, we propose additional information at the requirements analysis stage for defect management.

Digital Competence As A Component Of Professional And Information Culture Of A Teacher

  • Kharlamov, Mykhailo;Sinelnikov, Ivan;Lysenko, Vladyslav;Yakobenchuk, Nazar;Tkach, Anna;Honcharuk, Оlena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.169-172
    • /
    • 2021
  • Based on the scientific and pedagogical analysis of the theory and experience of teaching computer science disciplines, the didactic mechanism for ensuring the continuity of the average (full) general and higher professional education of economists for practical implementation innovative technology of personal experience foundation. The pedagogical conditions for the formation of information competence, including laboratory, design, research work, the use of active teaching methods for acquiring management skills in production and activities of the enterprise. An indispensable requirement for the conditions for the implementation of basic of educational programs is the assessment of competencies. With this the goal was to develop criteria and levels of formation information competence of future economists and carried out complex diagnostics.

Assurance Level Requirement Analysis on Electronic Authentication (전자 인증에 관한 보증 레벨 요구사항 분석)

  • Kim, Jun-Sub;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.637-638
    • /
    • 2009
  • 디지털 ID는 온라인 환경에서 사용자를 식별하기 위한 수단으로 사용되고 있다. 하지만 온라인상에 저장된 개인정보 노출뿐만 아니라 신원도용에 따른 사용자의 프라이버시 침해 및 금전적 피해 등으로 이어질 수 있어 이에 대한 관심과 중요성이 높아지고 있다. 따라서 본 논문에서는 전자적인 수단을 통해 정보 시스템에 제시되는 사용자 신원을 확인하는 전자 인증 과정과 신원 인증에 대한 보증 레별별 요구사항을 마련하고 있는 NIST SP 800-63을 분석하고자 한다.