-
Article type: Appendix
Pages
App7-
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
-
Shinichi MIZUHARA, Shigeaki TANIMOTO
Article type: Article
Session ID: 1401
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Although the Internet is progressing rapidly in recent years, threats, such as a virus and unauthorized access, are increasing. For this reason, construction of the public key infrastructure (PKI) is desired. In order to maintain a high security level, PKI consists of elements of a system, operation, facility, and is said to be high cost structure. For this reason, a university is not sufficient for the deployment of PKI. Its attention is paid to the CP/CPS which is a nucleus of PKI in this paper. That is, based on CP/CPS of campus PKI proposed in National Institute of Informatics, the concept of LOA is newly introduced and plural CP/CPSs are proposed. As a result, the alternative of PKI installation can increase and it can contribute to the deployment of campus PKI.
View full abstract
-
Toshihiko MORIYA, Shigeaki TANIMOTO
Article type: Article
Session ID: 1402
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Although the Internet which has accomplished rapid progress in recent years is convenient and efficient, the negative sides, such as a threat of a virus and unauthorized access, are also actualized. In order that these threats may realize not an exception but safe and secure Internet environment also in scientific environment, construction of a public key infrastructure (PKI) is desired, but the deployment is not sufficient. Generally it is said that PKI is high cost structure, and it is one of the reasons to PKI deployment. This paper clarifies cost structure in PKI quantitatively, and contributes it to campus PKI spreading and promotion.
View full abstract
-
Osamu KIKUCHI, Shigeaki TANIMOTO
Article type: Article
Session ID: 1403
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
In general, it is said that the information security field is difficult to visualize and calculate the cost-effectiveness. In this paper, the method for spread and promoting the CSIRT (Computer Security Incident response Team) activity which copes with it in a team about various threats on the Internet is proposed. Concretely, its attention is directed to the cost structure of CSIRT. The costs of CSIRT activity were not clarified sufficient until now. On the other hand, quantification of the structure, i.e., visualization, is performed in this paper. Accordingly, a decision of a manager is made easy and it contributes to spread and promotion of CSIRT.
View full abstract
-
Kazuyuki Yoshida, Takeo Sugihara
Article type: Article
Session ID: 1404
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
In order to solve various problems regarding IT infrastructure management, infrastructure design patterns have been developed that conceptualize and pattern the design of infrastructure. These contents have been widely used in internal projects and those of group companies that constantly achieve a certain goals. "Infrastructure Design Patterns" has been developed as a PM support tool by patterning past cases and experts' IT infrastructure know-how at NTT Data Corporation. Every employee of NTT Data group companies can get it from group portal site. We found that some didn't use them after the download. Therefore, we conducted interviews with users and experts, which revealed four problems. This paper will propose three hypotheses about the cause of and countermeasure to these problems in order to explain their details and verification results.
View full abstract
-
Toshiharu Arai, Hironori Takeuchi, Masaru Asaoka, Daisei Isomura, Shun ...
Article type: Article
Session ID: 1405
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Waterfall development process, which is the current mainstream, has also been actively discussed. Generally, it is pointed out that the Agile is difficult to take advantage of its strengths of large-scale projects, and the Waterfall is difficult to rapidly respond to specification changes. In this paper, we will propose a hybrid development that can combine the Agile and Waterfall in a mutually complementary manner. On the basis of the actual results obtained in a large-scale project in the financial industry, we will report the advantages and effects of the improved Agile development analyzed from the perspective of QCD and PMBOK knowledge areas.
View full abstract
-
Takeshi Muramatsu, Yasunobu Kino
Article type: Article
Session ID: 1406
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Knowledge of individual employees is the most important underlying assets for the company, especially for the large enterprise in service industry. However, most of the company struggles to implement efficient knowledge management system and needs to restructure the strategy for knowledge sharing activity with consideration of individual motivation toward knowledge sharing, in order to sustain growth of the company. This paper reveals motivation orientation toward knowledge sharing by questionnaire analysis, and base on the research output, the alternative knowledge sharing strategy has been implemented.
View full abstract
-
Gongyi Liu
Article type: Article
Session ID: 2407
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
This paper introduces the project process improvement method utilizing LEAN method. There are processes that are repeated throughout project phases. The productivity of theses process is link to progress project effectively. On the other hand, there is a method to improvement productivity and quality, LEAN production method and Toyota production method. In this paper introduce LEAN method adaptation method for on-going project process improvement and verification result with case study.
View full abstract
-
Fumikazu Kakita, Tooru Inaishi
Article type: Article
Session ID: 2408
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
"Agile" has gone mainstream of software development since 17 practical leaders of light-weight development methods declared "Manifesto for Agile Software Development" in 2001. In Japan, A lot of communities and workshops concerning Agile have been established and held since 2007, and we already cannot say that Agile is heterodoxy of software development in these days. However, what on earth is the Agile software development? As for the range where it means the term named Agile, it seems vague. So at first, this paper starts with analysis of the original sources of Agile those are Agile manifesto and 12 principles, and considers the value of the Agile methods and the practices. Finally We try to depict the characteristics and the real value of Agile software development with the key words which are "Sustainable pace" and "Self organized".
View full abstract
-
Yohichi Matsui, Taichiroh Nomura
Article type: Article
Session ID: 2409
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Requirement of improvement in quality, cost, schedule, communication becomes harder in product development project these days. Among the methods to solve this situation, CAE was adopted to improve effectiveness and design quality of product development. In this paper, how CAE improved quality, cost, schedule, communication among stakeholders is described with case example.
View full abstract
-
Kenichi Oda
Article type: Article
Session ID: 2410
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
The network configuration in the system infrastructure is getting large scale, complicated in recent years, and the risk in the network change operation increases. Especially, the configuration change of the networking components (Routers, Switches, Firewalls etc.) is not limited to a specific system, and there is a possibility of influencing over two or more systems. Therefore, it is preferable to settle on the risk, probability, influence, workaround, countermeasures on falure, and judge the change risk from two or more viewpoints. In this text, risk management in the network change work that the author had practiced was considered from technical viewpoint.
View full abstract
-
Kunio Namba
Article type: Article
Session ID: 2411
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Overview IBM's Internal Community Activities regarding activity types by result of investigation of actual on-going communities in IBM. In addition to that, show the overview of elements of community activities and useful tools and assistance from corporation.
View full abstract
-
Yusaku Nakajima, Tomohiro Taira, Hitoshi Kirita
Article type: Article
Session ID: 2412
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
J-SOX was enforced in Japan in 2008, to prevent the accounting scandal and the compliance that occur frequently. Some defects of internal management have been still seen though about four years. Risk and control matrix (RCM) at IT General Control (IT-GC), etc. is included a lot of things that the project manager tends to overlook generally. The audit test without considering these measures causes physical verifications, reconciliations, recurrence prevention measures, and the operation cost of this IT system increases against project manager's mind. Then, This paper describes points that project manager should note in the stage of the development process and the operation process in IT System that is Target Sarbanes-Oxley Act Audit.
View full abstract
-
Article type: Appendix
Pages
App8-
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
-
Masayoshi Umeda, Mitsuru Takada, Yonghua Nii, Masakatsu Chiba, Akiyosh ...
Article type: Article
Session ID: 1504
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
In this paper, we introduce the case example which makes anyone improve project management ability through PBL (Project Based Learning) activities. We suppose a virtual reality project which we have created, and each of us has conducted it as if we all were a project manager. The PBL activities include all activities needed to be completed a project successfully from the beginning to the end of the project. This paper shows the statistical results and the various effective methods that a project manager utilizes when managing a project.
View full abstract
-
Satoru Kashiwa
Article type: Article
Session ID: 1505
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
Since the Great East Japan Earthquake occurred on March 11, 2011, Disaster-Relief Volunteer is required in the greatest amount. Disaster-Relief Volunteer is different from the usual Volunteer in some points. Disaster-Relief Volunteer cover a wide variety of supports, is not defined work, and the Volunteer Member's experience and ability is not constant level. Volunteer Team Member and Volunteer activity are defined on the day. In this paper, study what Project Management methodologies are effective to Disaster-Relief Volunteer as a Personal Project.
View full abstract
-
Yuji Tsuchiya, Kazuaki Eto
Article type: Article
Session ID: 1506
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
It is difficult to familiarize on-site staff with essential rules in IT development because of their complexity and huge volume. Especially, demand from stakeholders and society as a whole for efforts towards security is ever increasing, while such efforts do not necessarily directly contribute to ensure the quality of products, which often prevents them from being understood by on-site staff. A large number of persons participate in a large-scale project; therefore, sharing of the project culture including security is one of the important and difficult managerial issues. As a solution to such an issue, we would like to introduce two approaches: "establishment of knowledge" using the WEB test environment and "establishment of basic activities" through "NEXT activities" that encourage autonomous improvements at a site, which contribute to a large-scale project.
View full abstract
-
Kenta Kondo, Shin-ichiro Yokoyama
Article type: Article
Session ID: 2507
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
A lot of IT projects often fail in the succession business in the stage of the operation and maintenance. In an actual enterprise, the interview investigation of the cause of the above failure was done. As a result, it has been understood that the cause of the failure is an insufficiency of risk management in the succession business. In addition, a tacit knowledge content in the succession business has not been succeeded. What is the tacit knowledge business that has not been succeeded? First of all, that is examined in this research. In addition, with what risk it is connected that succession had failed is examined. And, the necessity of the check list making for risk management is described examining the influence of the failure of succession.
View full abstract
-
Seiichiro Hata, Toshihiro Ioi, Shigeru Nagami, Hiroshi Okuhara
Article type: Article
Session ID: 2508
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
The research describes on the requirement definition of project management (hereafter PM) using dynamic simulation. Many effective researches have been reported on the requirement definition of PM. However, the precised technique for requirement definition using dynamic simulation has not been reported. If the bottle neck in manufacturing process is recognized and the solutions can be feedback to the requirement definition, the design of precised requirement definition is expected. In the research, the new technique on the design method of the requirement definition which is introduce the dynamic simulation (DELMIA), TRIZ (Teoriya Resheniya Izobretatelskikh Zadatch), TOC (Theory Of Constraint) and DTCN (Design to Customer Needs) technique is proposed.
View full abstract
-
Toshihiro Yokouchi, Ryousuke Suzuki, Toshihiro Ioi
Article type: Article
Session ID: 2509
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
The research describes on the project-based learning for the upbringing of fundamental abilities for social persons. Many effective researches have been reported on the project management education. However, the project based learning for the upbringing of the fundamental abilities for social persons has not been reported. If the fundamental abilities for social persons are possible to bring up by the project based learning, not only the upbringing of teamwork skills, but also the improvements of action and thinking skills are expected. In the research, the education model for the upbringing of the fundamental abilities for social persons is proposed, and the effectiveness of the proposed model is evaluated by the cooking project of the university students.
View full abstract
-
Article type: Appendix
Pages
App9-
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS
-
Article type: Cover
Pages
Cover2-
Published: September 15, 2011
Released on J-STAGE: June 08, 2017
CONFERENCE PROCEEDINGS
OPEN ACCESS