ãªãã®ã²ã¨éå¶å§å¡ä¼ãéçºããç¡æã¢ã¯ã»ã¹è§£æãµã¼ãã¹ããªãã®ã²ã¨ãã¯ã2013å¹´ã«ãµã¼ãã¹çµäºãã¾ããã User Local,Inc.
ãªãã®ã²ã¨éå¶å§å¡ä¼ãéçºããç¡æã¢ã¯ã»ã¹è§£æãµã¼ãã¹ããªãã®ã²ã¨ãã¯ã2013å¹´ã«ãµã¼ãã¹çµäºãã¾ããã User Local,Inc.
ITILã®ä¸ã«ã¯ã種ã ã®è§£æææ³ãåæææ³ã使ç¨ãããã¨ãæ¨å¥¨ããã¦ãã¾ãããããã®ãã¼ã«ã¯ãç¨éã¨ç®çãæ£ããç解ãã¦ä½¿ç¨ããã°ãæç¨ãªæ å ±ãå¾ããã¨ãã§ãã¾ãããããã®ãã¼ã«ã¯ã大å¥ããã¨æ¬¡ã®3段éã«åé¡ã§ããã§ãããã ï¼ï¼è¨ç»ãä¼ç»æ®µéã§ã®æ¤è¨ç¨ã®ææ³ ï¼ï¼ç¾å¨ã®ç¶æ³ãææ¡ããè¨æ¸¬ãææ¡ããææ³ ï¼ï¼çºçããäºæ ãäºä»¶ãæ¤è¨¼è§£æããææ³ ä»åã¯ãã©ã®ãã§ã¼ãºã§ãé©ç¨ã§ããæ é樹解æã«ã¤ãã¦è§£èª¬ãã¦ãããã¨ã«ãã¾ãã å®ãããã¨ãæ é樹解æããã¡ãã¨ç解ãã¦ããæ¹ã ã¯ãæå¤ã¨å°ãªãã®ã«é©ããã®ã§ããããªã¼æ§é ã®è§£æææ³ã ã¨ãããã¨ã¯ãã»ã¨ãã©ã®æ¹ãç解ãã¦ããã®ã§ãããå³ãæãã¦ããã ãã¨ãåãªãæåããã®å³ã«ãªã£ã¦ãã¾ãã®ã§ãã系統å³æ³ãç«æ´¾ãªææ³ã§ãããã©ããä¸ç·ã®ã¤ã¡ã¼ã¸ããã£ã¦ããæ¹ã ãå¤ãããã§ãã æ é樹解æã®ç¹é·ã¯ããã¼ã«ä»£æ°ã§è¡¨è¨ã§ããã¨ãããã¨ã§ãããããã£ã¦ã解æ
SWOTåæ ä¼ç¤¾ã®ãã¸ãã¹ã®æ¹åã製åãªãã³ã«ããã¸ã¡ã³ãã®é¢ãã診æããããäºæ¥ã®å¯è½æ§ãæ¤è¨¼ãããããã®ã«è¯ãç¨ãããããã¼ã«ã§ããITILã§ã¯ãä¼ç¤¾ã®æ¦è¦ãææ¡ãã段éãããã¸ãã¹ã®æ¹åã¨ITãµã¼ãã¹ã®æ¹åã®æ´åæ§ãåãã¦ããããå¤æããããã®ãã¼ã«ã¨ãã¦ä½¿ç¨ãããã¨ãå¨ãã¾ããSWOTã¯ä»¥ä¸ã®èªã®é è¾èªã§ãã Strengthï¼ å¼·ã¿ Weaknessï¼ å¼±ã¿ Opportunityï¼ æ©ä¼ Threatï¼ è å¨ ãã®åæãã¼ã«ã§ãããå®ã¯2種é¡åå¨ããã¨ãããã¨ããåç¥ã§ããããç§èªèº«ã¯ãå®ã¯ãã®åææ¹æ³ã2種é¡ãããã¨ã¯ãã¤ã2å¹´åã«ããã£ã次第ã§ãããã²ã¨ã¤ã¯é常ã«SWOTåæã¨ãããã¦ãããã®ã§ããããã²ã¨ã¤ãSWOTåæã¨ãããã¦ããã®ã§æ··ä¹±ãæããã¨ãããã®ã§ãããåºå¥ããããã«ã¯ç¹ã«âã¯ãã¹SWOTåæâã¨å¼ãã§ãã¾ãã大ããªéãã¯ãSWOTåæã¯ä»®èª¬æ¤è¨¼ãã¼ã«ã¨ã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}