Proceedings (National Conferences of The Society of Project Management)
2011.Autumn
Displaying 51-72 of 72 articles from this issue
  • Article type: Appendix
    Pages App7-
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
  • Shinichi MIZUHARA, Shigeaki TANIMOTO
    Article type: Article
    Session ID: 1401
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Although the Internet is progressing rapidly in recent years, threats, such as a virus and unauthorized access, are increasing. For this reason, construction of the public key infrastructure (PKI) is desired. In order to maintain a high security level, PKI consists of elements of a system, operation, facility, and is said to be high cost structure. For this reason, a university is not sufficient for the deployment of PKI. Its attention is paid to the CP/CPS which is a nucleus of PKI in this paper. That is, based on CP/CPS of campus PKI proposed in National Institute of Informatics, the concept of LOA is newly introduced and plural CP/CPSs are proposed. As a result, the alternative of PKI installation can increase and it can contribute to the deployment of campus PKI.
    Download PDF (1109K)
  • Toshihiko MORIYA, Shigeaki TANIMOTO
    Article type: Article
    Session ID: 1402
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Although the Internet which has accomplished rapid progress in recent years is convenient and efficient, the negative sides, such as a threat of a virus and unauthorized access, are also actualized. In order that these threats may realize not an exception but safe and secure Internet environment also in scientific environment, construction of a public key infrastructure (PKI) is desired, but the deployment is not sufficient. Generally it is said that PKI is high cost structure, and it is one of the reasons to PKI deployment. This paper clarifies cost structure in PKI quantitatively, and contributes it to campus PKI spreading and promotion.
    Download PDF (1101K)
  • Osamu KIKUCHI, Shigeaki TANIMOTO
    Article type: Article
    Session ID: 1403
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    In general, it is said that the information security field is difficult to visualize and calculate the cost-effectiveness. In this paper, the method for spread and promoting the CSIRT (Computer Security Incident response Team) activity which copes with it in a team about various threats on the Internet is proposed. Concretely, its attention is directed to the cost structure of CSIRT. The costs of CSIRT activity were not clarified sufficient until now. On the other hand, quantification of the structure, i.e., visualization, is performed in this paper. Accordingly, a decision of a manager is made easy and it contributes to spread and promotion of CSIRT.
    Download PDF (835K)
  • Kazuyuki Yoshida, Takeo Sugihara
    Article type: Article
    Session ID: 1404
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    In order to solve various problems regarding IT infrastructure management, infrastructure design patterns have been developed that conceptualize and pattern the design of infrastructure. These contents have been widely used in internal projects and those of group companies that constantly achieve a certain goals. "Infrastructure Design Patterns" has been developed as a PM support tool by patterning past cases and experts' IT infrastructure know-how at NTT Data Corporation. Every employee of NTT Data group companies can get it from group portal site. We found that some didn't use them after the download. Therefore, we conducted interviews with users and experts, which revealed four problems. This paper will propose three hypotheses about the cause of and countermeasure to these problems in order to explain their details and verification results.
    Download PDF (732K)
  • Toshiharu Arai, Hironori Takeuchi, Masaru Asaoka, Daisei Isomura, Shun ...
    Article type: Article
    Session ID: 1405
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Waterfall development process, which is the current mainstream, has also been actively discussed. Generally, it is pointed out that the Agile is difficult to take advantage of its strengths of large-scale projects, and the Waterfall is difficult to rapidly respond to specification changes. In this paper, we will propose a hybrid development that can combine the Agile and Waterfall in a mutually complementary manner. On the basis of the actual results obtained in a large-scale project in the financial industry, we will report the advantages and effects of the improved Agile development analyzed from the perspective of QCD and PMBOK knowledge areas.
    Download PDF (820K)
  • Takeshi Muramatsu, Yasunobu Kino
    Article type: Article
    Session ID: 1406
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Knowledge of individual employees is the most important underlying assets for the company, especially for the large enterprise in service industry. However, most of the company struggles to implement efficient knowledge management system and needs to restructure the strategy for knowledge sharing activity with consideration of individual motivation toward knowledge sharing, in order to sustain growth of the company. This paper reveals motivation orientation toward knowledge sharing by questionnaire analysis, and base on the research output, the alternative knowledge sharing strategy has been implemented.
    Download PDF (833K)
  • Gongyi Liu
    Article type: Article
    Session ID: 2407
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    This paper introduces the project process improvement method utilizing LEAN method. There are processes that are repeated throughout project phases. The productivity of theses process is link to progress project effectively. On the other hand, there is a method to improvement productivity and quality, LEAN production method and Toyota production method. In this paper introduce LEAN method adaptation method for on-going project process improvement and verification result with case study.
    Download PDF (560K)
  • Fumikazu Kakita, Tooru Inaishi
    Article type: Article
    Session ID: 2408
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    "Agile" has gone mainstream of software development since 17 practical leaders of light-weight development methods declared "Manifesto for Agile Software Development" in 2001. In Japan, A lot of communities and workshops concerning Agile have been established and held since 2007, and we already cannot say that Agile is heterodoxy of software development in these days. However, what on earth is the Agile software development? As for the range where it means the term named Agile, it seems vague. So at first, this paper starts with analysis of the original sources of Agile those are Agile manifesto and 12 principles, and considers the value of the Agile methods and the practices. Finally We try to depict the characteristics and the real value of Agile software development with the key words which are "Sustainable pace" and "Self organized".
    Download PDF (975K)
  • Yohichi Matsui, Taichiroh Nomura
    Article type: Article
    Session ID: 2409
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Requirement of improvement in quality, cost, schedule, communication becomes harder in product development project these days. Among the methods to solve this situation, CAE was adopted to improve effectiveness and design quality of product development. In this paper, how CAE improved quality, cost, schedule, communication among stakeholders is described with case example.
    Download PDF (484K)
  • Kenichi Oda
    Article type: Article
    Session ID: 2410
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    The network configuration in the system infrastructure is getting large scale, complicated in recent years, and the risk in the network change operation increases. Especially, the configuration change of the networking components (Routers, Switches, Firewalls etc.) is not limited to a specific system, and there is a possibility of influencing over two or more systems. Therefore, it is preferable to settle on the risk, probability, influence, workaround, countermeasures on falure, and judge the change risk from two or more viewpoints. In this text, risk management in the network change work that the author had practiced was considered from technical viewpoint.
    Download PDF (569K)
  • Kunio Namba
    Article type: Article
    Session ID: 2411
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Overview IBM's Internal Community Activities regarding activity types by result of investigation of actual on-going communities in IBM. In addition to that, show the overview of elements of community activities and useful tools and assistance from corporation.
    Download PDF (709K)
  • Yusaku Nakajima, Tomohiro Taira, Hitoshi Kirita
    Article type: Article
    Session ID: 2412
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    J-SOX was enforced in Japan in 2008, to prevent the accounting scandal and the compliance that occur frequently. Some defects of internal management have been still seen though about four years. Risk and control matrix (RCM) at IT General Control (IT-GC), etc. is included a lot of things that the project manager tends to overlook generally. The audit test without considering these measures causes physical verifications, reconciliations, recurrence prevention measures, and the operation cost of this IT system increases against project manager's mind. Then, This paper describes points that project manager should note in the stage of the development process and the operation process in IT System that is Target Sarbanes-Oxley Act Audit.
    Download PDF (848K)
  • Article type: Appendix
    Pages App8-
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
  • Masayoshi Umeda, Mitsuru Takada, Yonghua Nii, Masakatsu Chiba, Akiyosh ...
    Article type: Article
    Session ID: 1504
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    In this paper, we introduce the case example which makes anyone improve project management ability through PBL (Project Based Learning) activities. We suppose a virtual reality project which we have created, and each of us has conducted it as if we all were a project manager. The PBL activities include all activities needed to be completed a project successfully from the beginning to the end of the project. This paper shows the statistical results and the various effective methods that a project manager utilizes when managing a project.
    Download PDF (3207K)
  • Satoru Kashiwa
    Article type: Article
    Session ID: 1505
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Since the Great East Japan Earthquake occurred on March 11, 2011, Disaster-Relief Volunteer is required in the greatest amount. Disaster-Relief Volunteer is different from the usual Volunteer in some points. Disaster-Relief Volunteer cover a wide variety of supports, is not defined work, and the Volunteer Member's experience and ability is not constant level. Volunteer Team Member and Volunteer activity are defined on the day. In this paper, study what Project Management methodologies are effective to Disaster-Relief Volunteer as a Personal Project.
    Download PDF (852K)
  • Yuji Tsuchiya, Kazuaki Eto
    Article type: Article
    Session ID: 1506
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    It is difficult to familiarize on-site staff with essential rules in IT development because of their complexity and huge volume. Especially, demand from stakeholders and society as a whole for efforts towards security is ever increasing, while such efforts do not necessarily directly contribute to ensure the quality of products, which often prevents them from being understood by on-site staff. A large number of persons participate in a large-scale project; therefore, sharing of the project culture including security is one of the important and difficult managerial issues. As a solution to such an issue, we would like to introduce two approaches: "establishment of knowledge" using the WEB test environment and "establishment of basic activities" through "NEXT activities" that encourage autonomous improvements at a site, which contribute to a large-scale project.
    Download PDF (706K)
  • Kenta Kondo, Shin-ichiro Yokoyama
    Article type: Article
    Session ID: 2507
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    A lot of IT projects often fail in the succession business in the stage of the operation and maintenance. In an actual enterprise, the interview investigation of the cause of the above failure was done. As a result, it has been understood that the cause of the failure is an insufficiency of risk management in the succession business. In addition, a tacit knowledge content in the succession business has not been succeeded. What is the tacit knowledge business that has not been succeeded? First of all, that is examined in this research. In addition, with what risk it is connected that succession had failed is examined. And, the necessity of the check list making for risk management is described examining the influence of the failure of succession.
    Download PDF (605K)
  • Seiichiro Hata, Toshihiro Ioi, Shigeru Nagami, Hiroshi Okuhara
    Article type: Article
    Session ID: 2508
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    The research describes on the requirement definition of project management (hereafter PM) using dynamic simulation. Many effective researches have been reported on the requirement definition of PM. However, the precised technique for requirement definition using dynamic simulation has not been reported. If the bottle neck in manufacturing process is recognized and the solutions can be feedback to the requirement definition, the design of precised requirement definition is expected. In the research, the new technique on the design method of the requirement definition which is introduce the dynamic simulation (DELMIA), TRIZ (Teoriya Resheniya Izobretatelskikh Zadatch), TOC (Theory Of Constraint) and DTCN (Design to Customer Needs) technique is proposed.
    Download PDF (7763K)
  • Toshihiro Yokouchi, Ryousuke Suzuki, Toshihiro Ioi
    Article type: Article
    Session ID: 2509
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    The research describes on the project-based learning for the upbringing of fundamental abilities for social persons. Many effective researches have been reported on the project management education. However, the project based learning for the upbringing of the fundamental abilities for social persons has not been reported. If the fundamental abilities for social persons are possible to bring up by the project based learning, not only the upbringing of teamwork skills, but also the improvements of action and thinking skills are expected. In the research, the education model for the upbringing of the fundamental abilities for social persons is proposed, and the effectiveness of the proposed model is evaluated by the cooking project of the university students.
    Download PDF (8431K)
  • Article type: Appendix
    Pages App9-
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
    Download PDF (17K)
  • Article type: Cover
    Pages Cover2-
    Published: September 15, 2011
    Released on J-STAGE: June 08, 2017
    CONFERENCE PROCEEDINGS OPEN ACCESS
feedback
Top