최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기서비스연구 = Journal of service research and studies, v.11 no.1, 2021년, pp.45 - 58
신정철 ((주)에프아이솔루션) , 김동수 (건국대학교 정보통신대학원) , 김희완 (삼육대학교 컴퓨터공학부)
Requirements engineering can be seen as proceeding with various processes and activities such as extraction, analysis, specification, management, and verification without temporal and spatial constraints in the development environment of information systems that are becoming large and decentralized....
Byun, J. W., Kim, J. H., Rhee, S. Y., and Hwang,?M. S.(2010), "A Technique for Classifying?Requirement/Stakeholder and Generating?Information for Negotiation Using Kano Model and?Statistical Method," Journal of the Information?Science Society: Software and Applications,?Vol.37, No.3, pp. 161-169
Byun, J. W., Hwang, M. S., and Rhew, S. Y.(2012),?"Metrics for Representing Consistency between?Requirements and Objectives/Constraints,"?Journal of the Information Science Society:?Software and Applications, Vol. 39, No. 4, pp.?269-279
Cho, H. K., Lee, J. H.(2013), "A Study of Design?Process for Sensor-based Smart clothing based on?requirement engineering," Emotional Science,?Vol.16, No.3, pp. 397-408
Choi, S. K., Choi, E. H.(2013), "Requirements?Engineering & Management by the Object?Oriented Methodology in the Weapon system,"?Jouranl of Information and Security, Vol.13, No.3,?pp. 55-62
G. Kotonya, L. Sommerville(2000),?「Requirements Engineering: Processes and?Techniques」, John Willey and Sons.
Joo, Y. K., Kim, D. S., Rhee, H. K., and Kim, H.?W.(2014), "Effects of the Information System?Operation Audit on the Quality of Information?System," Journal of the Korean Society of?Knowledge and Information Technology, Vol.9,?No.6, pp. 781-795
K. Wiegers(2003), 「SoftwareRequirement,2nded」, MicrosoftPress.
Kim, H. W., Lee, H. M., and Kim, D. S.(2011),?"Design on Fixed Quantity Analytical Model for?Information System Audit," Journal of the Korea?Contents Association, Vol. 11, No.2, pp. 88-100
Kim, H. K.(2013), "A Study on the Security Audit?Model of Financial Institutions using ISMS and?PIMS," Graduate School of Information and?Communication, Konkuk University, Master's?Thesis
Lee, H. O.(2002), A Study on Compulsory?Information System Audit Plan, National?Information Society Agency.
Lee, J. Y., Kim, D. S., and Kim, H. W.(2010),?"Design of Information Protection Audit Model?in Information System Audit," Journal of Digital?Industry Information Society, Vol.6, No.2, pp.?233-245
Ministry of Public Administration and?Security(2012), E-government law, National Law?Information Center
Moon, M. K., Yeom, K. H.(2004), "An Approach?to Managing Requirements as a Core Asset in?Software Product - Line," Journal of the?Information Science Society: Software and?Applications, Vol. 31, No. 8, pp. 1010-1026
National Information Society Agency(2009a),?Information Systems Audit Check Guide, National?Information Society Agency.
National Information Society Agency(2009b),?Information System Audit Manual, National?Information Society Agency
National Information Society Agency(2013),?Information System Audit Implementation?Guide_V2.1, National Information Society Agency.
R. S. Pressman, 「Software Engineering A?Practitioner's Approach,7thed」, McGraw-Hill,?2009.
S. Robertson(2006), Mastering the?Requirements Process, 2nded, AddisonWesley.
Song, S. K., Park, S. Y., and Lee, J. H.(2012).?"Thesaurus-Based Non-Functional?Requirements Elicitation Technique for Agile?Methodology," Journal of the Information?Science Society: Software and Applications, Vol.?39, No. 8, pp. 655-663
Soren Lauesen(2006), Software Requirements:?Styles & Techniques, AddisonWesley.
The Standish Group, "CHAOS Summary 2009",?The Standish Group, 2009.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.