최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.4, 2021년, pp.763 - 777
Information security started as an IT operation process and is now recognized as an important issue of information technology, and each international organization is newly defining the concept. Information security itself is a new combination of IT technologies, a set of technologies and a technolog...
Choi, Yun-Ho. "A IT Service Management Performance Model Based on Val IT for IT Governance." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, pp.1724-1727, Nov. 2012
Park, Chul-Han, Sang-Soo Kim, and Hoh In. "A Selection Methodology for SLA Evaluation Factors with End-user Perspective." Proceedings of the Korea Information Processing Society Conference. Korea Information Processing Society, pp.495-498, Nov. 2006
Sim, Hyun-bo. "From Information Security To Syber Security." RESEAT Monitoring Report, 2012.
Kang, Un-Sik, Kyoung-Han Bae, and Hyun-Soo Kim. "A Cost Optimization Model of IT Operation Service by Improving Service Request Management Process." Journal of Information Technology Services 6.3, pp.87-110, Dev. 2007
Park, WonIl, and MyongSoon Park. "Cloud computing billing system associated with SLA." Proceeding of Korea Computer Congress 2013, pp.854-855, Jun. 2013
Standard, Australian. "ISO/IEC27002." Information technology-security techniques-code of practice for information security controls,(AS ISO/IEC 27002: 2015). 2015.
ITIL, "Service Support", The Stationery Office, 2001
ITIL, "Service Delivery", The Stationery Office, 2001
Hwang Kyung-tae and Nam Gi-chan."Foundation of IT Service Management Based on ITIL V3", 2008
Claire Agutter. "ITIL Essentials Foundation Essentials ITIL 4 Edition", ITIL, 2020
National Information Society Agency. "The Operation Management Guideline of Information System", 2005
Shin, Sung-Jin, Sung-Yul Rhew, and Yoo-Ri Kim. "A case study on selection and improvement of sla evaluation metrics." The KIPS Transactions: PartD 16.4, pp.541-548, Aug. 2009
KISA, "Development of efficient operation plan of security SLA for security service." pp.99-145. 2010
Lee, E. J. "A Study on the Operation of ITSM for Small Scale IT Department." Journal of Human Computer Interaction 2011.1 (2011): 12-13.
Rhew, Sung-Yul, Sung-Jin Shin, and Yoo-Ri Kim. "A Study on Selection and Improvement of SLA Evaluation Metrics Using IT Maturity Model." Journal of Information Technology Services 8.4, pp141-150, Dec. 2009
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.